Sie sind auf Seite 1von 29

Task-1-P1

Introduction

In this task I am going to elaborate about different network types.

Networking

Networking is the construction, design, utilization of a network, including those physical (cabling,
hub, bridge, switch, router, also others forth), the selection and utilization of telecommunication
protocol Also workstation product for utilizing also Dealing with the network.

There are many network types in networking. Some of them are Client server model, Peer-to-Peer
model, and Hybrid models. Those models induces clustering, cloud computing, centralized
computing, virtual computing and so on.

Client Server Model

In this network system model number from claiming computers, perform Likewise the server
technology the place others execute Likewise those client computers. As far as those server, they
need greater part capable over client computers in the matter from performance, connectivity and
memory with a lot of people more competencies.

Peer to peer model

A peer to peer network can be characterized when 2 or more than 2 computers are joined to same
computer with equal source without setting off through a differentiate server computer. We could
say that peer to peer system may be made eventually by peers in the system. In this network we
don't need centralize server to monitor and handle the client’s computer. Furthermore, we also
don't require different capacity medium because we don't have centralize server. It will be not
necessary that the file stored on one system ought to be accessible in each different client computer
for network.

Cloud Network System

Cloud Networked system is a system that store the data in the internet, which is cloud. Thus, cloud
basically refers to internet. Storing data and files for cloud doesn't mean it is not saved over hard
drive. Typically, it is put away Previously, A server hard drive. The only possible reasonably be
expected through web. The cloud organize system will be secure as Client-Server organize. This
makes us to think that the reason we require to purchase all the Also work own information data
point and the hire admin when we can get services to them.

Cluster Network System

In a computer system, a cluster is a group of servers and different resources that act as single unit
system and enable high availability Also over some cases, load balancing and parallel preparing.
As stated by the definition, we realize that those in this cluster network system in different servers
are associated to a cluster will perform more go about as a single system. This organize is utilized
to the parallel processing, load balancing and so on.

Centralized Network System

A centralize network system share those same meaning for client-server system network. In this
network client would associated with the center from the place every last one of general
administration and processing of the data is performed.

OSI Models

OSI which refers to open system interconnection model is a logical design that provides for those
organize correspondence utilized by system interested in communication also intercommunication
system with different system. OSI model will be broken under seven sub parts or layers every from
represents a theoretical collection from providing layers above and below it.

TCP/IP Model

TCP/IP protocol is four-layer calculated model known as DARPA model, named then afterward
U.S government, as TCP/IP. Those four layers of the DARPA model are: Application, Transport,
Internet, and network interface. Each layer in the DARPA model compares should no less than
one layers of the seven-layer open system interconnection (OSI) model.
Task-2-P2
Introduction

I have to discuss about the Network topology and its types.

Network Topology

We might characterize topology similarly as those geometrical plan for connecting computers and
other network devices and nodes. “A network topology is the arrangement of a network,
including its nodes and connecting lines.” (Rouse, 2018) There are two types of network
topology the physical topology and the logical (or signal) topology.

Bus Topology

In this topology, every workstation is connected in main. “A bus topology is a network setup in
which each computer and network device are connected to a single cable or backbone. Depending
on the type of network card used in each computer of the bus topology, a coaxial cable or a RJ-
45 network cable is used to connect computers together.” (Hope, 2018)

Ring Topology

In this topology, the workstation are connected in closed loop configuration. A ring topology is
network setup in which devices connected as a circular data path. Each networked devices is
associated with two others, like point ahead on circle. Together, devices in a ring topology are
referred to as a ring network.
Star topology

In this topology there is a main server where all other workstation is connected. “Alternatively
referred to as a star network, star topology is one of the most common network setups. In this
configuration, every node connects to a central network device, like a hub, switch, or computer.
The central network device acts as a server and the peripheral devices act as clients. Depending on
the type of network card used in each computer of the star topology, a coaxial cable or a RJ-
45 network cable is used to connect computers together.” (Hope, 2018)

Mesh Topology

In this topology, workstation is connected on each other. “A network setup where each computer
and network device is interconnected with one another, allowing for most transmissions to be
distributed, even if one of the connections go down. It is a topology commonly used for wireless
networks. Below is a visual example of a simple computer setup on a network using a mesh
topology?” (Hope, 2018)
Hybrid Topology

“A hybrid topology is a type of network topology that uses two or more other network topologies,
including bus topology, mesh topology, ring topology, star topology, and tree topology.”
(Computer Hope, 2017) Hybrid topology is the combination of two or more topology, like star,
bus, tree, mesh, ring topology are involve as the part of hybrid topology.
Selection of best network topology

 Economic condition.
 Flexibility
 Clarity of the topology.
 About data security.
 Data error rate.
 Transmission speed
 Maintainability
 Volume of traffic

Choosing good topology in scenario.

In this scenario the Star topology is flexibility and is appropriate in Nepal Bank.

Conclusion

In this part I have brief discussion about network topology and which one is good for the scenario
of Nepal bank.
Task-4-P3
Server

A server is a computer program that gives administration on in turn computer program (and its
user). In a data center, those physical computer that a server program runs frequently is called
server. That machine might be a committed server or it might make utilized to different purposes
as well. Server is the primary computer which provide specific facilities and control of the
particular number for customers. Servers would use to oversee and control network resources. Fore
occurrence a client might setup a server on control Also entry with organize send/receive email
alternately group a gadget or host a devices. Likewise there would a numbers of servers for
example, Print Server, ftp server, Web server and so on.

Principle of server operating

 Consuming time
Utilizing the server that will make meets expectations less demanding and in addition
speedier of the director or those member computers. Toward relating mine situation task
over Nepal bank here, I utilized one server called print server that will consume the long
time also Server similar to dc (Domain Controller), DHCP (Dynamic host configuration
Protocol), WDS (Windows deployment server) Also a lot of people more server that I used
to devour duration of the time Also for superior execution in the situation known as Nepal
bank.
 Making network secure
Through server, we can manage all computers through one server toward providing for
restricted power. Also, control the part workstations by one workstation that is main
workable through server. Dc (Domain Controller) CDC (Child domain Controller),
relegating one assembly arrangement need aid those principle cases should settle on secure
systems administration framework to mine situation called Nepal Bank.
 Backup
I describe over utilizing the server it will naturally store information also updated every
last one of new information in the move down server. RODC (Read Only Domain
Controller) will assistance should save information naturally from DC (Domain Controller)
Furthermore CDC (Child Domain Controller) upgrading the information the long time
might concluded toward those system director by looking those circumstances from
looking an organization.

Hub

A hub is planned on be joined and stacked or positioned ahead top on another hub, forming a
growing stack.it amplifies data and broadcast them. “A network hub is a node that broadcasts data
to every computer or Ethernet-based device connected to it”. (TechTarget, 1999)

Principle of hub operating

 Multiple ports
The benefits of hub is it can be connected in multiple ports.
 Data transferring
It will send the data packet to all the ports included in the networks that increase data traffic
a lot

Router

A router transfer the data package in computer network.

“A router connects networks. Based on its current understanding of the state of the network it is
connected to, a router acts as a dispatcher as it decides which way to send each information packet.
A router is located at any gateway (where one network meets another), including each point-of-
presence on the internet. A router is often included as part of a network switch”. (techtarget, 2000)

Principle to operate router

 Manage the routing Table


It helps to manage routing table and helps to find reliable routes.
 Controlling data traffic
It help to find efficient routes so it helps to control data traffic.

Switch

A switch is a device Use to connect multiple computer in same network


“In a telecommunications network, a switch is a device that channels incoming data from any of
multiple input ports to the specific output port that will take the data toward its intended
destination. In the traditional circuit-switched telephone network, one or more switches are used
to set up a dedicated though temporary connection or circuit for an exchange between two or more
parties. On an Ethernet local area network (LAN), a switch determines from the physical device
(Media Access Control or MAC) address in each incoming message frame which output port to
forward it to and out of. In a wide area packet-switched network such as the Internet, a switch
determines from the IP address in each packet which output port to use for the next part of its trip
to the intended destination”. (techtarget, 2000)

Principle to operate Switch


 Centralize the connection.
Switch centralize many connection in LAN.
 Share files

It helps to share files.

Firewall

A firewall is Device or software which control the traffic of the incoming and outgoing network.
“In computing, a firewall is software or firmware that enforces a set of rules about what data
packets will be allowed to enter or leave a network. Firewalls are incorporated into a wide variety
of networked devices to filter traffic and lower the risk that malicious packets traveling over the
public internet can impact the security of a private network. Firewalls may also be purchased as
stand-alone software applications” (techtarget, 2000)

Repeater

“In digital communication systems, a repeater is a device that receives a digital signalon an
electromagnetic or optical transmission medium and regenerates the signal along the next leg of
the medium. In electromagnetic media, repeaters overcome the attenuation caused by free-space
electromagnetic-field divergence or cable loss. A series of repeaters make possible the extension
of a signal over a distance”. (techtarget, 2000)

Bridge
It helps to examine the system and decide whether it should be forward or despose.

“In telecommunication networks, a bridge is a product that connects a local area network (LAN)
to another local area network that uses the same protocol (for example, Ethernetor token ring).
You can envision a bridge as being a device that decides whether a message from you to someone
else is going to the local area network in your building or to someone on the local area network in
the building across the street. A bridge examines each message on a LAN, "passing" those known
to be within the same LAN, and forwarding those known to be on the other interconnected LAN
(or LANs)”. (techtarget, 2000)

Web server

“A Web server is a program that uses HTTP (Hypertext Transfer Protocol) to serve the files that
form Web pages to users, in response to their requests, which are forwarded by their computers'
HTTP clients. Dedicated computers and appliances may be referred to as Web servers as well”.
(techtarget, 2000)

File server

“In the client/server model, a file server is a computer responsible for the central storage and
management of data files so that other computers on the same network can access the files. A file
server allows users to share information over a network without having to physically transfer
files by floppy diskette or some other external storage device. Any computer can be configured
to be a host and act as a file server. In its simplest form, a file server may be an ordinary PC that
handles requests for files and sends them over the network. In a more sophisticated network, a
file server might be a dedicated network-attached storage (NAS) device that also serves as a
remote hard disk drive for other computers, allowing anyone on the network to store files on it as
if to their own hard drive”. (techtarget, 2000)
Task-5-P4
Introduction

In this task I am going to describe about hardware and software relating my scenario.

There are 11 server in main office, and few server in the branch in the head office there are 4
department every departments contain 10 client computers as also to branch. All the Microsoft
software, server and operating system are use. In the client software, I used windows 7 as the
operating system.
Hardware required to run client

I use system that contain basic things like Pentium 4 with 256 GB hard drive and 2 GB of RAM.

Using hardware for software

RAM

I use 2GB ram so that the system will run smoothly and perform basic task.

Processor

Processor plays vital role in a system so I use Pentium 4 processor

Storage

About storing data, we need to store basic files so I use 256GB hard drive which is not much more
and can store basic data and files.

Compatibility to install server

I use heave hardware system because of the nature of server. I use 11 server which have their own
roles and features.

Hardware

I use 4 GB ram and 512 GB hard drive with i7 64 bit processor for my Nepal bank scenario.

Firewall

Firewall play a vital roles in network traffic. In my scenario, I have to secure my network traffic
so I use hardware and software firewall device. As required I use cisco firewall.

Conclusion

In this task I compare all the hardware and software in my scenario.


Task 8-P5
Introduction:

Nepal Bank is “A” class commercial bank of Nepal with 55% share by government. The bank has
about 131 branches in Nepal. The bank wants to build a network model to meet their current
requirements. Here I am presenting an efficient and sustainable network design for head office and
branch office.
Requirements:

Server technology: Dynamic Host Configuration Protocol (DHCP), Domain Controller (DC),
Read Only Domain Controller (RODC), Domain Name System (DNS), Routing and Remote
Access Service (RRAS), Virtual Private Network (VPN),Print Server

Design: Head office and branch office network design. .

IP address used by Network components:

As a rule, every PC that gets to the Internet needs to have one of a kind IP address. Much of the
time, when we interface with the Internet from home (for instance, utilizing a solitary PC), our
Internet specialist organization appoints an extraordinary IP deliver to our PC. Be that as it may,
in the event that we need to interface every one of the PCs in our office to the Internet in the
meantime utilizing a solitary Internet association, our Internet specialist organization for a scope
of IP addresses - one IP address for each every PC. This is the place diverse IP classes become
possibly the most important factor - relying upon the quantity of PCs we need to associate and
need an alternate class of IP address run. . An IP address serves two essential capacities: host or
system interface distinguishing proof and area tending to.

There are four type of IP address; Private IP address, Public IP address, Static IP address,
Dynamic IP address.

 Private IP address: In short, private IP address are used “inside” a network, like one
probably run at home. These types of IP addresses are used to provide a way for a
devices to communicate with your router and all the IP addresses can be set manually
or assigned automatically by a router.
 Public IP address: Public IP addresses are used on the “outside” of a network and are
assigned by an ISP.

 Dynamic IP Address: It is an IP address that isn't static and could change whenever.
This IP deliver is issued to you from a pool of IP addresses allotted by your ISP or
DHCP Server. This is for a substantial number of clients that don't require a similar IP
Address all the ideal opportunity for an assortment of reasons.

 Static IP Address: It is an IP address which is doled out physically, that is settled and
never shows signs of change. This is rather than a dynamic IP address which may
change whenever. Most ISP is a solitary static IP or a square of static IP.

 IP version 4: Right now utilized by most system gadgets. Be that as it may, with an
ever increasing number of PCs getting to the web, IPv4 addresses are running out
rapidly.

 IP version 6: It is the replacement for the aging IPv4.


Design evaluation

Any system ought to be intended to be up constantly, this implies we need to comprehend our
system and what disappointments may influence the system operation and give all methods for
excess to guarantee for all intents and purposes 100% uptime of our system. This is normally a
trade-off between the criticality of the applications running over the system and the financial plan.
Chairmen need to ensure that at any given time the system is fit for conveying parcels to their
goals in a convenient manner with an adequate postponement and jitter profile.
Overview of server:

Domain Controller:

“Primary domain controller (PDC) and backup domain controller (BDC) are roles that can be
assigned to a server in a network of computers that use the Windows NT operating system.
Windows NT uses the idea of a domain to manage access to a set of network resources
(applications, printers, and so forth) for a group of users. The user need only to log in to the domain
to gain access to the resources, which may be located on a number of different servers in the
network. One server, known as the primary domain controller, manages the master user database
for the domain. One or more other servers are designated as backup domain controllers. The
primary domain controller periodically sends copies of the database to the backup domain
controllers. A backup domain controller can step in as primary domain controller if the PDC server
fails and can also help balance the workload if the network is busy enough”. (techtarget, 2000) It
helps to controlled or whether to restrict or allow the devices to use some system.

Justification of Domain Controller

We have utilized area controller in Nepal Bank which encourages us to enables them to allow or
deny clients access to framework wide assets, for example, printers, reports, envelopes, arrange
areas and so forth

Domain Name Server (DNS):

A Domain Name Server is a database of area names which makes an interpretation of them to
working Internet Protocols (IP). “A Domain Name Server is a database of area names which makes
an interpretation of them to working Internet Protocols (IP). It can be considered as a likeness
telephone directory for a system. This is important in light of the fact that individuals may think
that it’s simple to recall area names however a machine does not work like that as it get to various
spaces intensive their IP.” (techtarget, 2000)

Justification of domain name services (DNS)

It is chiefly used to change over human significant names (space name) to PC important name (IP
address) in Internet. This is on the grounds that PCs can just perceive IP addresses. It enables us
to utilize web all the more effortlessly by enabling us to determine a significant name on our web
program as opposed to utilizing IP address.

Secondary DNS

The secondary DNS zone is the perused just duplicate of the DNS records. This implies the DNS
records can't be added straightforwardly to the secondary DNS zone. The secondary DNS zone
can get the refreshed records just from the essential DNS zone of the DNS server

Justification of Secondary DNS

Instead of expecting to roll out record improvements in the frameworks, a typical approach is to
design one of the suppliers as essential and alternate as optional, slaved to the essential supplier.
At that point, all administration is done in the essential supplier, however both essential and
optional are utilized for conveyance.

Read Only Domain Controller (RODC)

As the name suggests, a Read Only Domain Controller is a server that hosts the read-only portions
and responds to security validation requests of an Active Directory Domain Services of a Domain
Controller

Justification of Read Only Domain Controller

The principle explanation behind utilizing a RODC is essentially for security purposes, while
additionally giving area strength at remote workplaces. On the off chance that a remote office has
poor physical security or is just serving few exceptionally non-IT disapproved of staff, there is no
justifiable reason motivation to have a completely writable area controller on location.

Child Domain Controller (CDC)

The meaning of a Child Domain Controller (CDC) can be separated from its name. As the name
advocates, a kid space controller (CDC) is another area which is the offspring of the parent space.

Print Server
A Print Server is a server that interfaces every one of the gadgets in a system to the printer. It
acknowledges print demands from every one of the gadgets in the server and lines them up to
oblige the reality it can't deal with all the print asks for in one go.

Overview of network devices

Router:

A router is a device used to transfer data packets between different computer and networks.

Printer:

A printer is a device which is used for the printing of different materials such as text, images etc.

Switch:

A switch is a network device that is used to connect different devices in a network.

Firewall Device:

A firewall is a predefined set of instructions that monitors the incoming and outgoing of data in a
networked system.
Task-12-P7
Introduction

In this task, I designed the workstation and its implementation, install the server and performances
with screenshots

Implementing

Lab report.

Conclusion

As per this task I have provide step by step process of screenshot.

Task-13-P8
Introduction

In this task, I have to analyze and provide test result against expected result.

Implementing

IP address is the unique Id for the computer that also show the identity of the computer.

IP Testing

S. Expected Testing Actual Output


N Date

1 Using ipconfig in the CMD As I expected output was similar.


it have to show the used IP
address of the computer i.e.
192.168.1.1.

Evidence

Critical Analysis
Using the ipconfig user won’t get problems while assigning the ip address.
Testing domain controller (DC)

Domain Controller Testing

S.N Expected Testing Actual Output


Date

1 While testing it must show the name of As required output is appear


the Domain Controller. (Nepal Bank) as Nepal Bank.

Evidence 1 Evidence 2

Critical Analysis
The DC will provide restriction to the member users whether to give permission or not.
Testing DHCP

Dynamic host configuration protocol helps to provide automatic ip address to computer.

Dynamic Host Configuration Protocol Testing

S.N Expected Testing Actual Output


Date

3 All the distributed IP address have to Output is as expected.


show in the IP address lease.

IP: 192.168.1.1 to 192.168.1.100

Evidence

Critical Analysis
DHCP will dynamically distributes the IP address.
Testing Child domain controller (CDC)

It helps to share features of domain controller (DC).

CDC Testing

S.N Expected Testing Actual Output


Date

1 All the features of DC with As I expected the output.


the addition features of
CDC

Evidence

Critical Analysis
Using the ipconfig that user will not face the problems while assign the ip address in case he/she
forget the IP address.
Testing Domain Name System (DNS)

DNS Testing

S.N Expected Testing Actual Output


Date

1 The Nepal Bank host name As expected


must convert into IP
address.

Evidence

Critical Analysis
Using the DNS will help to remember the host name as compare the IP address.
Testing Windows Deployment Server (WDS)

Windows deployment server helps to deploy windows in a network without using any hard ware
devices.

WDS Testing

S.N Expected Testing Actual Output


Date

1 WDS sever have distributes The Expected output was got.


image file.

Evidence

Critical Analysis
Distributing the Image File in a network will help to deploy windows.

Testing Virtual Private Network (VPN)


It helps to give permission to access in the private networks from any public networks from
anywhere

VPN Testing

S.N Expected Testing Actual Output


Date

1 Gave access in private The Expected output was got.


network through public
network.
Evidence

Critical Analysis
It is used full while errors occurring in the network. It can be repaired form anywhere from any
network by network administrator.

Conclusion

All the testing was performed well as expected. The result is shown as expected with evidence.

Das könnte Ihnen auch gefallen