0% found this document useful (0 votes)
12 views98 pages

Networking Basics Guide

Uploaded by

Manish Sah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views98 pages

Networking Basics Guide

Uploaded by

Manish Sah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Networking

2019

Table of Content
Part1................................................................................................................................................. 5

Introduction..................................................................................................................................5

Explanation of types of network:..................................................................................................6

On the basis of geographical basis:..................................................................................................6

1) LAN...................................................................................................................................6

2) MAN..................................................................................................................................6

3) WAN................................................................................................................................. 7

On the basis of functionalities:.........................................................................................................8

1) Peer to peer........................................................................................................................ 8

2) Client-server...................................................................................................................... 9

Network standards and its types:...................................................................................................10

Introduction................................................................................................................................10

1) IEEE 802.x............................................................................................................................ 10

2) OSI Model............................................................................................................................10

3) TCP/IP model.......................................................................................................................11

Network topology, communication and bandwidth requirement..............................................12

Introduction:.................................................................................................................................. 12

Types of topology....................................................................................................................... 12

Bus Topology..........................................................................................................................12

Ring Topology........................................................................................................................ 13

Star topology...........................................................................................................................14

Tree Topology........................................................................................................................ 15

Page 1
Networking
2019
Mesh topology........................................................................................................................ 16

Network principles and effectiveness of networked systems.....................................................17

OSI Model................................................................................................................................... 17

Types of protocols..........................................................................................................................19

Topology protocol for the efficient utilization of networking system.........................................20

Introduction................................................................................................................................... 20

Merits of Star Topology..................................................................................................................20

Demerits of Star Topology............................................................................................................. 20

Why Star Topology?................................................................................................................... 20

Task 4............................................................................................................................................. 21

Networking devices.................................................................................................................... 21

Introduction................................................................................................................................21

Bridge......................................................................................................................................... 22

Router.........................................................................................................................................22

Gateway..................................................................................................................................... 23

HUBs........................................................................................................................................... 23

Repeater..................................................................................................................................... 24

Server......................................................................................................................................... 24

 Domain server................................................................................................................. 25

 DNS server...................................................................................................................... 25

 DHCP sever..................................................................................................................... 25

 IIS server......................................................................................................................... 26

 Print server...................................................................................................................... 26

 VPN server...................................................................................................................... 26
Page 2
Networking
2019
 RODC server................................................................................................................... 26

 CDC server...................................................................................................................... 27

 WDS server..................................................................................................................... 27

 FTP server....................................................................................................................... 27

 Mail server.......................................................................................................................27

 Routing and remote access server....................................................................................27

Interdependence of workstation hardware with relevant networking software...........................28

Introduction................................................................................................................................28

Workstation................................................................................................................................28

VMware workstation..................................................................................................................28

Networking software..................................................................................................................29

1. Client software.................................................................................................................29

2. Server software:...............................................................................................................30

3. Client Operating System:.................................................................................................30

4. Server Operating System.................................................................................................30

5. Firewall............................................................................................................................31

Types of server and selection of server......................................................................................32

Introduction................................................................................................................................32

Dell PowerEdge T30...............................................................................................................32

Dell PowerEdge T20...............................................................................................................33

HP Proliant Microserver Gen 8...............................................................................................34

About the servers....................................................................................................................... 35

Conclusion.................................................................................................................................. 35

Part 3.............................................................................................................................................. 36
Page 3
Networking
2019
Introduction................................................................................................................................36

Assigning IP Address:..................................................................................................................37

Devices and Services used in this design....................................................................................38

Domain Controller (DC).............................................................................................................. 38

Dynamic Host Configuration Protocol (DHCP)............................................................................38

Windows Deployment Services (WDS).......................................................................................39

Virtually Private Network (VPN).................................................................................................39

Firewall....................................................................................................................................... 39

Switch......................................................................................................................................... 40

Router.........................................................................................................................................40

Domain Name System (DNS)...................................................................................................... 40

Access point................................................................................................................................40

Testing and evaluating the design..............................................................................................41

INTRODUCTION.......................................................................................................................... 41

Evaluation................................................................................................................................... 42

Feedback form............................................................................................................................43

Analyzing Feedback.................................................................................................................... 43

Maintenance schedule to support a networked system............................................................44

Back up................................................................................................................................... 44

Security................................................................................................................................... 44

Upgrade.................................................................................................................................. 45

Audit....................................................................................................................................... 45

Maintenance schedule............................................................................................................... 45

Part 4.............................................................................................................................................. 46
Page 4
Networking
2019
Implementation..........................................................................................................................46

Lab Report.................................................................................................................................. 46

Recommending potential enhancements...................................................................................89

Introduction................................................................................................................................89

Use of server technology............................................................................................................89

Work evaluation......................................................................................................................... 90

Introduction:.................................................................................................................................. 90

Test Plan..................................................................................................................................... 92

Implementation of network design............................................................................................93

Conclusion and Recommendation..............................................................................................93

Documenting and analyzing test results against expected results.............................................94

1) Domain Controller (DC).......................................................................................................94

2) Domain naming server (DNS)..............................................................................................95

3) Web server (IIS)...................................................................................................................... 96

4) Dynamic host configuration protocol (DHCP)......................................................................97

5) Print server..........................................................................................................................97

6) Read Only Domain Controller (RODC).....................................................................................98

7) Windows deployment service (WDS)..................................................................................99

Bibliography................................................................................................................................. 100

Part1
Discuss the benefits and constraints of different network types and standards.

Explain the impact of network topology, communication and bandwidth requirement.

Page 5
Networking
2019
Compare common networking principles and how protocols enable the effectiveness of networked
systems.

Considering a given scenario, identify the topology protocol selected for the efficient utilization of
a networking system.

Introduction
A network is a series of interconnected nodes that can receive, transfer and exchange data, voice
and videos. Computer networks uses various protocols and algorithms to specify how the
endpoints transfers or receives data. A network consists of two or more computers that are linked
in order to share resources, exchange files or allow electronic communications. Computer on
network maybe linked through cables, telephones, radio waves, satellites or infrared beams.
Similarly, network protocol is a set of rules that governs the communications between computers
on a network. Rules of network protocol include guidelines that regulates the following
characteristics of a network: access method, allowed physical topologies, types of cabling and
speed data transfer.

Networking is divided into two basis i.e., geographical basis and functionalities basis

 Geographical basis: LAN, MAN, WAN, VWAN OR LWAN.


 Functionalities basis: Peer to peer and Client Server.

Explanation of types of network:


On the basis of geographical basis:
1) LAN: Local Area Network (LAN) also called Intranet. It is confined to a relatively small
area. It is generally limited to a geographical area. It is generally limited to a geographical
area such as school or building. For e.g. LAN of Singh durbar, LAN of NTC Kapan
Branch.

Advantages of LAN:

 Sharing of resources: All the resources are attached to one network and if any computer
needs any resources then it can be shared with required computer. Types of resources
are the DVD drive, printers, scanners, modems and hard drives. So there is no need to
purchase separate resource for each computer and it saves money.

Page 6
Networking
2019
 Client and server relationships: All the data from attached computers can be stored in
one server. If any computer needs data then that computer user can simply login and
access the data from the server.
 Sharing of the internet: In offices and net cafes, we can see that one internet connection
is shared between all computers. This is also the type of LAN technology in which
main internet cable is attached to one server and then distributed.
 Communication is easy: In LAN computers can exchange data and message in the easy
and fast way. It also saves time and makes our work fast.

Disadvantages of LAN:

 Data security problem: If the server computer is not set up correctly there is a leak in
security then unauthorized users can access the data.
 Limitation of distance: LAN’s are usually made with building or nearby building that
cannot extend to the wider area.

2) MAN: MAN (Metropolitan Area Network) is a type of network limited over a city. A
metropolitan area network is made with a combination of several LAN through point to
point connections. MAN usually involves connection of fiber optics wires to boost data
transfer speed.

Advantages of MAN:

 Less expensive: It is less expensive to attach MAN with WAN. MAN gives the good
efficiency of data. In MAN data is easily managed in centralized way.
 Sending local emails: On MAN we can send local emails fast and free.
 High speed than WAN: MAN uses fiber optics so the speed of the data can easily reach
upon 1000Mbps. Files and databases can be transferred fast.
 Sharing of the internet: In some installation of MAN’s users can share their internet
connection. So multiple users can get the same high-speed internet.

Disadvantages of MAN:

Page 7
Networking
2019
 Difficult to manage: If MAN becomes bigger then it becomes difficult to manage it. This is
due to a security problem and other extra configuration.
 Internet speed difference: MAN cannot work on traditional phone copper wires; else it
works in very low speed. So the high cost is required to setup fiber optics.
 Hackers attack: In MAN there are high chances of attacking hackers on the network
compared to LAN. So data maybe leaked.
 Technical people required to setup: To setup MAN, it requires technical people that can
correctly setup MAN. Those people are network administrators and troubleshooters.
 More wires required: In MAN, additional cables are required to connect two LAN which is
a major problem.

3) WAN
WAN (Wide Area Network) is a network that connects network in large geographical areas
such as Florida or USA. The transmission of data is carried out with the help of hubs,
switches, fiber optics, modem and routers.

Advantages of WAN:

 Covers large geographical areas: WAN covers a large geographical area of 1000km or
more. If our office is in different cities or countries then we can connect our office
branches through WAN.
 Centralized data: Any company doesn’t need to buy email, files, and backup servers, they
can all reside on head office. All office branches can share the data through the head office
server. We can get backup support and useful data from the head office.
 Get updated files and data: Software companies work over the live server to exchange
updated files. So all the coders and office staff get updated version of the files within
seconds.
 Sharing of software and resources: Like LAN we can share software applications and other
resources like a hard drive, RAM with other users on the internet. In web hosting, we share
computer resources among many websites.

Disadvantages of WAN:
Page 8
Networking
2019
 Security problem: WAN has more technologies combined with each other which can
create a security gap. That’s why WAN has more security problem.
 Needs firewall and antivirus software: As data transferred on the internet can be
accessed and changed by hackers so firewall needs to be enabled in the computer.
Some people can inject virus into the computer so antivirus needs to be installed.
 Troubleshooting problems: As WAN covers a lot of areas so fixing the problem in it is
difficult. Most of WAN wires go into the sea and wires get broken sometimes. It
involves a lot of resources to fix lines under the sea.

On the basis of functionalities:


1) Peer to peer: It is a simple type of network which is used by small organization like school,
college. There is no security in this type of network because it has no server.

Advantages of Peer to peer network are:

 No need for a network operating system.


 Does not need an expensive server because individual workstations are used to access
the files.
 No need for specialist staff such as network technicians because each user sets their
own permission as to which files they are willing to share.
 Much easier to setup.
 If one computer fails it won’t disrupt any other part of the network.

Disadvantages of Peer to peer network are:

 Because each computer might be being accessed by others it can slow down the
performance for the user.
 Files and folders cannot be centrally backed up.
 It might be difficult to locate the files and resources if the computer’s owner doesn’t have a
logical filling system.

Page 9
Networking
2019
 Ensuring that viruses are not introduced to the network is the responsibilities of each
individual user.
(Tonnau, 2002)

2) Client-server
It is advanced type of network. This type of network is difficult to set-up and costly as
compared to other networks. This type of network is used by large scale organization
which has highly sensitive data. For e.g. used by Telecoms, hospitals, banks etc.

Advantages of client server network are:

 All files are stored in a central location.


 Network peripherals are controlled centrally.
 Backups and network security is controlled centrally.
 Users can access shared data which is centrally controlled.

Disadvantages of client server network are:

 A specialist networking operating system is needed.


 The server is expensive to purchase.
 Specialist staff such as network manager is needed.
 If any part of the network fails a lot of disruption can occur. (Tonnau, 2002)

Network standards and its types:


Introduction
The institute of electrical and electronic engineer (IEEE), an international organization responsible
for developing and providing networking technology specification for worldwide like specification
of physical layout, cabling and method used to access and maintain communication in and
between network media is called network standards. Some network standards are describes below:

Page 10
Networking
2019
1) IEEE 802.x
It is a port based IEEE standards Network Access Control (PNAC). It is a part of the IEEE
802.1 group of network protocols. IEEE 802.x controls access to virtual local area network
or wireless and applies various policies based on user identity.

2) OSI Model
OSI stands for open systems interconnection which was introduced by the International
Organization for Standardization (ISO). The main purpose of designing this model is to
describe the function of communication system. The OSI model provides a framework for
creating and implementing network standards and devices and describe how network
application on different computers can communicate through the network media. It
consists of seven layer and each layer is responsible for transferring data.

Advantages of OSI Model


 Various layer of OSI model is distinguished according to the services, interfaces
and protocols.
 It adopts the divide and conquers technique. All the services are distinguished in
various layers.
 Changes in one layer does not affect the other layer as it follows abstraction
principle.
 It is more secure as it has various layers.

Disadvantage of OSI Model

 It does not define any particular protocol.


 Difficult to fit new protocol.
 Layer is interdependent among one another. They need to wait data form its
predecessor.
 Duplication of services in various layer like in transport and data link layer have a
problem in control mechanism.

Page 11
Networking
2019

3) TCP/IP model
It is developed by the Defense Advance Research Project Agency (DARPA). Like the
OSU model, it describes general guidelines for designing and implementing computer
protocols. It consists four layers: Network Access, Internet, Transport and Application.
Today, all computers connecting to the Internet or Internet like private WANs are
essentially using protocol.

Advantages of TCP/IP:
 It is used to establish connection between different types of computers.
 It functions without depending on the operating system.
 It supports various routing-protocols.
 It enables the internet working between the organizations.

Disadvantage of TCP/IP

 Hard to manage and setup.


 TCP/IP is slower in comparison with another model like IPX.
 It assigns an IP address to each computer on the network.
 It is not owned by any institute so it is open protocol suite and can be used by any
individual or organization.

Network topology, communication and bandwidth requirement


Introduction:
A network topology is the arrangement of nodes—usually switches, routers or software switch
router feature and connection in a network, often represented as a graph. The topology of the
network, and the relative locations of the source and destination of traffic flows on the network
determine the optimum path for each flow and extent to which redundant options for routing exist
in the event of a failure.

Page 12
Networking
2019
There are many different types of topologies that modern enterprise networks are built on.
Established network topologies include bus topology, ring topology, star topology, mesh topology
and hybrid topology.

Types of topology
Bus Topology
Bus topology is a type of network where every device is
connected to a single cable which runs from one end of the
network to the other. This type of topology is often referred
to as bus topology. If a bus topology has two endpoints then
it is referred to as a linear bus topology. Smaller networks
with this type of topology will generally use RJ45 cable to link devices together.

Advantages of Bus Topology

 This type of topology keeps the layout simple.


 All devices are connected to a single cable so we don’t need to manage a complex
topological setup.
 The simple layout also helps make bus topologies cost effective because they can be run
with a single cable.
 We can simply join our cable to another cable in the event that more devices is need to be
added.

Disadvantages of Bus Topology

 All the cables has to rely on one cable so if the cable fails then the entire network will go
down.
 A cable failure can cost organizations a lot of time while attempt to resume service.
 Network will decrease significantly as all the data will be travelling through one cable.
 Bus topologies are limited in the sense that they are half- duplex, which means that data
can’t be transmitted in two opposite directions simultaneously.

Page 13
Networking
2019
Ring Topology
In networks with a ring topology, computers are connected to
each other in a circular format. Every devices in the network will
have two neighbors and no more or no less. The first node is
connected to the last node to link the loop together. As a
consequence of being laid out in this format packets need to travel
through all nodes on the way to their destination. With this topology, one node is chosen to
configure the network and monitor other devices. Ring topologies are half-duplex but can also be
made full-duplex.

Advantages of Ring Topology

 The risk of packet collisions is very low due to the use of token-based protocols, which
allow one station to transmit data at a given time.
 Data can move through nodes at high speeds.
 Ring topologies as a whole are low cost to install.

Disadvantages of Ring Topology

 The failure of one node can take the entire network out of operation; this means the
networks need to be constantly managed to ensure the condition of all nodes.
 The bandwidth is shared by all devices within the network, and if more devices are added
to a network, it experiences communication delay.
 Making changes to a ring topology is also complicated because we need to shut down the
network to make changes to existing nodes or add new nodes.

Star topology
A star topology is a topology where every node in the network
is connected to one central node. Every device in the network is
directly connected to the central node and indirectly connected
to every node. The relationship between these elements is that

Page 14
Networking
2019
the central network device is a server and other devices are treated as clients. The central node has
the responsibility of managing data transmissions across the network. The central node or hub also
acts as a repeater.

Advantages of Star Topology

 It is the most commonly used because we can manage the entire network from one
location; the central hub.
 If a node that isn’t the central node goes down then the network will remain up; this gives
star topologies a layer of protection against failures that aren’t always present with other
topology setups.
 We can add new computers without having to take the network offline like we have to do
with a ring topology.
 Star topologies require fewer cables than other topology types, this makes them simple to
set up and manage over the long term.

Disadvantages of Star Topology

 Though star topologies maybe relatively safe from failure, if the central node goes down
then the entire network will go down.
 Star topology is expensive to set up and use.

Tree Topology
A tree topology is a network structure that is shaped like a
tree with its many branches. Tree topologies have a root
node which is connected to other node hierarchy. The
hierarchy is parent-child where there is only one mutual
connection between two connected nodes. As a general rule, a tree topology needs to have three
levels to the hierarchy in order to be classified this way.

Page 15
Networking
2019

Advantages of tree topology

 In Star Topology, it is easy to add more nodes to the network when our organization grows
in size.
 This format also lends itself well to finding errors and troubleshooting because we can
check for performance issues systematically through the tree view.

Disadvantages of Tree Topology

 The most significant weakness of tree topology is the root node. If the root node fails then
all of its sub trees become partitioned. There will still be partial connectivity within the
network amongst other devices such as the failed node’s parent.
 Maintaining the network is not simple either because the more nodes you add, the more
difficult it becomes to manage the network.
 Cables are required to connect every device throughout the hierarchy which makes the
layout more complex when compared to a simpler topology.

Mesh topology
A mesh topology is a point-to-point connection where
nodes are interconnected. In this form of topology, data
is transmitted via two methods: routing and flooding.
Routing is where nodes are routing logic to work out the
shortest distance to the packet’s destination. In contrast
flooding, data is sent to all the nodes within the network. There are two forms of mesh topology:
partial mesh topology and full mesh topology. With partial mesh topology, most nodes are
interconnected but there are a few which are only connected to two or three other nodes. A full
mesh topology is where every node is interconnected.

Page 16
Networking
2019
Advantages of Mesh Topology

 Mesh topologies are used first and foremost because they are reliable.
 The interconnectivity of nodes makes them extremely resistant to failures. There is no
single machine failure that could bring down the entire network. The absence of a
single point of failure is one of the reasons why this is a popular topology choice.

Disadvantages of Mesh Topology

 They require an immense amount of configuration once they are deployed.


 The topological layout is more complex than many other topologies and this is
reflected by how long it takes to set up.
 You’ll need to accommodate a whole host of new wiring which can add up to be
quite expensive.

Source from: (Kearky, 2017)

Network principles and effectiveness of networked systems.


Introduction

There are various network principles of OSI layer and protocols that enhance the networked
system like TCP/IP, UDP, HTTP, FTP, SMTP, DNS, and DHCP. Networking principle along with
protocols are described below:

OSI Model
OSI layer is a seven-layer model. The OSI model woks in such an order assigning tasks to all
seven layers. Each layer is responsible for performing assigned tasks and transferring completed
task to the next layer for the further processing. Many protocols are developed based on the OSI
Model working mechanism. The networking principles of OSI Model are:

 Layer 1: Physical layer


Physical layer describes the signal like electrical or optical which is used for
communication. It is also called hardware layer. It is concerned with the physical

Page 17
Networking
2019
characteristics of electrical or optical signaling techniques which includes the voltage of
electrical current used to transport the signal, the media type (Twisted Pair, Coaxial Cable,
Optical Fiber), impedance characteristics, physical shape of the connector,
synchronization, etc. physical layer of OSI model exclude the transmission media. The
most common example of device that work on physical layer is HUB.

 Layer 2: Data link


In this layer, data packets are encoded and decoded into bits. It provides transmission
protocol knowledge and management and handles errors into the layer 1, flow control and
frame synchronization. It has two layer called MAC layer and the Logical Link Control
(LLC) layer. MAC sub layer controls the access to the data on the network and LLC layers
helps to check error. The device called switch works on layer 2.
 Layer 3: Network layer
The technologies like switching and routing is provided by network layer. For transmitting
data from one layer to another it crates logical paths. Functioning like routing,
internetworking, error handling, congestion control and packet sequencing are the major
function of this layer. Router is an example of this layer.

 Layer 4: Transport layer


It is a layer of OSI Model which provides transparent transfer of data between end systems.
It plays a vital role for end to end recovery and flow control. It ensures complete data
transfer. If a data is sent from computer 1 to computer 2 then transport layer is responsible
for breaking the data into smaller packets, so that if any packets are lost then it will
recognize and send it back. Transport layer will be responsible for opening the sent
message in computer 2 and reconstruct the original message. TCP, UDP works in layer 4
for transferring data.

 Layer 5: Session
This layer ends connection, manages and establishes connection between applications at
each of the communication. In practice, transport layer and session layer are combined
with each other to perform their function. Session layer sets up, coordinate and ends
Page 18
Networking
2019
conversations, exchange dialogues between the applications at each end. NFS, SQL works
in this layer.

 Layer 6: Presentation
Presentation layer receives data from the application layer, to be sent over the network, it
makes sure that the data is in proper format. Presentation layer also manage and convert
data that are not in the correct format. After receiving data from the session layer, it makes
sure that the data is in the proper format and it needed it converts and if data are not in the
format it helps to represent the data on the screen. This layer helps to make standard format
for effective communication.

 Layer 7: Application layer


It provides application services for transferring file, E-mail and other various network
software services. Application layer relies on all other layers below it to complete its
process. In this stage the data or application is presented in a visual form which is easily
understood by the user. In synchronizing communication, all communication between
applications requires cooperation that is managed by the application layer. Implementation
of application layer includes HTTP, FTP, SMTP and TELNET.

A computer protocol defines rules and conventions for communication between network devices.
Network protocols include mechanisms for devices to identify and make connections with each
other, as well as formatting rules that specify how data is packaged into sent and received
message.

Types of protocols
1. TCP: Transmission Control Protocol is used for communication over a network. In
TCP data is broken down into small packets and then sent to the destination.
2. IP: Internet Protocol is an addressing Protocol. IP addresses packets route them and
show different nodes and network, unless it reaches its right destination. The IP is
developed in 1970.

Page 19
Networking
2019
3. FTP: File Transfer Protocol is basically used for transferring files to different networks.
There may be a mass of files such as text files, multimedia, etc.
4. SMTP: Simple Mail Transfer Protocol manages the transmission and outgoing mail
over internet.
5. HTTP: Hyper Text Transfer Protocol is based on client-server model. It is used for
making connection between web client and web server.

Topology protocol for the efficient utilization of networking system

Introduction
There are various types of topologies such as bus topology, star topology, ring topology, mesh
topology, etc. all of them have their own benefits and excellence in working. As the topology is
selected depending upon the environment we are going to use for. So considering the given
scenario, I select star topology for the efficient utilization of networked system. As being network
administrator, it’s my role to choose the best. So in this business field today, star topology is the
most popular for a company like LANDMARK.

Merits of Star Topology


 We can manage the entire network from one location; the central hub.
 There is a layer of protection against failures in star topology.
 Adding a new computer when offline is easy.
 Fewer cables requirement (simple to set up and manage over the long term).

Demerits of Star Topology


 Star topology is expensive to set up and use.
 Failure of switch affect the entire network.
 Need of cables to connect computer with switch.

Why Star Topology?


When setting up a network, one of the first decision
made is what kind of topology to use. A network

Page 20
Networking
2019
topology dictates how different sender and receiver nodes will communicate with each other. Each
type of topology will have its advantages and drawbacks, making it important to pick the topology
that will give the company best performance and stability for network.

That’s why star topology is the most suitable for a given scenario due to centralization.
Centralization helps to make easy to monitor and handle the network. If the network is not
working properly then there may be a problem in switch. The switch makes easy and simple for
troubleshooting in a single point. Company holds a lot of sensitive data so security should not be
neglected. Security is maintained by using switch and cables. Star topology is also faster than
other topologies. Removing and adding computer is relatively easier than other topologies. With
all these pros of Star Topology, I found this topology contains those features that any company or
organization wish for. So star topology is featured as the network system of LANDMARK IT
Company.

Task 4
Discuss the operating principles of networking devices and server types.

Discuss the interdependence of workstation hardware with relevant networking system.

Explore a range of server and justify the selection of server, considering a given scenario
regarding cost and performance optimization.

Networking devices
Introduction
Networking devices are those devices through which communication can be occur. These devices
work for the smooth data transfer among different nodes of same network or nodes of different
network.

Networking devices

Bridge Page 21
Router Modem
Networking
2019

Bridge
Bridge is a device which is used for connecting similar
or dissimilar Local Area Networks (LANs). Its concept
is based upon store and forward technology. By
connecting different LANs, it can expand the
geographical area of a network. A bridge consists of
two ports and different LANs can be connected
through these ports. Bridges amplifies the signals and filter the data packets as required. Bridge
device work at the data link layer of the Open System Interconnect (OSI) model, connecting two
different networks together and providing communication between them. Bridges are similar to
repeaters and hubs in that they broadcast data to every node. However, bridges maintain the media
access control (MAC) address table as soon as they discover new segments, so subsequent
transmissions are sent to the desired recipient. Bridges are also known as Layer 2 switches.

Router
A router is a device which is used for connecting
similar and dissimilar networks. In any network
whenever data transmission occurs, it is done
through a series of nodes that are connected from
source to destination. The shortest path to
transmit the data from source to destination is
called route and the process is called as routing
and this is achieved using routers. Routers are combination of software and hardware. Router

Page 22
Networking
2019
analyzes the contents of data packets transmitted within a network or to another network. Routers
determine whether the source and destination are on the same network or whether data must be
transferred from one network type to another, which requires encapsulating the data packet with
routing protocol header information for the new network type.

Gateway
Gateway is another network device which is used for
connecting networks with different types of architectures.
For example: Communication between a mobile device
having 4G connection and landline device having 2G
connection can be done using gateway. A gateway device
provides communication to a remote network or an autonomous system that is out of bounds for
the host network nodes. Gateway serves as the entry and exit point of a network; all data routed
inward or outward must first pass through and communicate with the gateway in order to use
routing paths. Generally, a router is configured to work as gateway device in computer networks.

HUBs
A HUB is a multi-port repeater in which, signals
received at a port and floods out the signal to all other
ports connected to the devices except the one that
originated the signal. A hub, in the context of
networking is a hardware device that relays
communication data. A hub sends data packets (frames) to all devices on a network, regardless of
any MAC addresses contained in the data packet. Common HUBs used in networking are network
hubs, passive hubs, intelligent and switching hubs.

Network HUBs: These are common connections points for network devices, which
connect segments of a LAN and may contain multiple ports.
Passive HUBs: These only serve as paths or conduits for data passing from one
device or network segment, to another.

Page 23
Networking
2019
Intelligent HUBs: These HUBs allow system administrators to monitor data
passing through and to configure each port, meaning to determine the device that is
plugged into port.
Switching HUBs: These HUBs actually read the attribute of each unit of data. The
data is then forwarded to the correct or intended port.

Repeater
In all communication channels signals get week after
they travel some particular amount of distance. So it
is necessary to boost up these weak signals, which is
done with the help of repeaters. Repeater retransmits
a received signal with more power and to an
extended geographical or topological network
boundary than what would be capable with the
original signal. A repeater is implemented in computer networks to expand the coverage area of
the network, repropagate a weak or broken signal and or service/ input signal to a higher
frequency domain so that it is reusable, scalable and available. Repeaters are also known as signal
boosters. Repeaters were introduced in wired data communications networks due to the limitation
of signal in propagating over a longer distance and now are a common installation in wireless
networks for expanding call size.

Server
Server is a type of computer program that stores the resources centrally of entire network. Server
manages, monitors and controls the entire network centrally. Some of the first servers were
mainframe computers or minicomputers. Minicomputers were much smaller than mainframe
computers, hence the name. However, as technology progressed, they ended up becoming much
larger than desktop computers, which made the term microcomputer somewhat farcical.

The types of server are:

1. Domain server 2. DNS server 3. DHCP server

4. IIS server 5. Print server 6. VPN server


Page 24
Networking
2019
7. RODC server 8. CDC server 9. WDS server

10. FTP server 11. Mail server 12. Routing and remote
access

 Domain server: A domain controller (DC) is a server that responds to security


authentication requests within a Windows Server domain. It is a server on a Microsoft
Windows or Windows NT network that is responsible for allowing host access to Windows
domain resources. A domain controller is the centerpiece of the Windows Active Directory
service. It authenticates users, stores user account information and enforces security policy
for a Windows domain.

 DNS server: DNS stands for Domain Name


Server; it is a type of system server which is
used to assign IP Address, to the website.
DNS translates Internet Domain and host
names to IP address and vice versa. On the
internet, DNS server automatically converts
what we type in our Web browser address bar to the IP addresses of Web servers hosting
these site.

 DHCP sever: DHCP stands for Dynamic Host


Control Protocol. DHCP server is a type of system
server which assigns dynamic IP address, gateways,
subnet mask and other system configuration to client
networking devices automatically. DHCP is mainly
used in large scale organizations where more time
will be consumed for assigning IP address and where large computers are in use. By
assigning different IP address to the device connected, DHCP allows them to communicate
with each other.

Page 25
Networking
2019

 IIS server: IIS Server is a program that uses HTTP (Hyper Text Transfer Protocol). It is
used for hosting websites and other content on the Web. Microsoft's Internet Information
Services provides a graphical user interface (GUI) for managing websites and the
associated users.

 Print server: A print server is a


software application, network device
or computer that manages print
requests and makes printer queue
status information available to end
users and network administrators.
(Rouse, 2010) A print server
associates printers to customer PCs
over a system and are used in both small and large enterprises.

 VPN server: A VPN (Virtual Private Network) is


a server that we can use when we connect to the
Internet. It secures our online traffic and data,
making sure so that we can enjoy private browsing
and unrestricted access to any online content we
want.

 RODC server: RODC is that type of domain controller in the Windows Server operating
system which assists Domain Controller that’s why RODC is also called as Assistant
domain controller or Helping Domain. RODC is mainly used to handle the balance of the
primary domain controller (PDC).

Page 26
Networking
2019
 CDC server: A Child Domain is another domain under a parent one in an active directory
domain hierarchy. A Child Domain under a parent first root domain form a tree. For e.g. If
yahoo.com is our main domain then our sub domain will be mail.yahoo.com.

 WDS server: WDS server (Windows Deployment Services) is a server role that gives
administrators the ability to deploy Windows operating systems remotely. WDS can be
used for network based installations to set up new computers so administrators do not have
to directly install each operating system (OS).

 FTP server: FTP (File Transferring


Server) is a computer which transfers
files between client and server on a
computer network. FTP is a very well
established protocol that allows two
computers to transfer data over the
internet. One computer acts as the
server to store information and the other acts as the client to send or request files from the
server.

 Mail server: A mail server is a


computer system that sends and
receives email. In many cases, web
servers’ and mail servers are combined
in a single machine. However, large
ISPs, and public email services (Gmail
or Hotmail) may use dedicated hardware for sending and receiving email.

 Routing and remote access server: A routing and remote access server is a suite of network
services in the windows server family that enables a server to perform the services of a
conventional router. Routing and remote access server includes an application

Page 27
Networking
2019
programming interface (API) that facilitates the development of applications and processes
for administering a range of network services.

Interdependence of workstation hardware with relevant networking software.

Introduction
Hardware refers to the physical elements of a computer. It is also called machinery or the
equipment of the computer. Examples of hardware in a computer are: keyboard, mouse, CPU,
monitor, etc. A computers hardware is comprised of many different parts, but perhaps the most
important of these is the motherboard. The motherboard is made up of even more parts that power
and controls the computer. Similarly, software also known as programs or apps, consists of all the
instructions that tells the hardware how to perform a task. For example a program that is designed
for the Windows operating system will only work for the specific operating system. Software is
capable of performing many tasks as opposed to hardware which can only perform mechanical
tasks that they are designed for. (Mullins, n.d.)

Workstation
A workstation is a computer intended for individual use that is faster and more capable than a
personal computer. It’s intended for business or professional use (rather than home or recreational
use). Workstations and applications designed for them are used by small companies, architects,
graphic designers, and any organization, that require faster microprocessors, or a large amount of
random access memory and special features such as high-speed graphics adapters. The most
commonly used workstation is VMware Workstation.

VMware workstation
VMware workstation is a program that allows us to run a virtual computer within physical
computer. The virtual computer runs as if it was its own machine. There’s a cool future in
VMware Workstation that basically let us share our VM from one machine so that we can access it
from any other machine remotely. This is great because if we have multiple copies of VMware on
different computers, we either have to clone our VM or have to store our VMs in a central

Page 28
Networking
2019
location. (Kishore, 2017). Installing VMware workstation requires a various hardware component
like processor, RAM, Hard disk, etc.

Hardware Requirement Recommended


Processor 64 bit and 1.4 GHz 2 GHz
RAM 2 GB 4 or 8 GB
Hard disk 60-100 GB More than 100 GB

Networking software
Networking software is a software that facilitates, enhances and interacts with computer network.
There are two types of networking software i.e., first one permits computers to communicate with
each other and another type of networking software that provides users to access shared programs.
The networking software’s are:

1. Client software 2. Server software 3. Client operating software

4. Server operating software 5. Firewall

1. Client software: It is a special software that helps to connect client with server. Client
software receives data or instructions from a remote program (server). Some common
client software that we are common with are: web browsers, email clients, instant
messenger chat clients, and bittorent clients. The hardware requirements of client software
are:

Operating System Processor Hard disk RAM


Windows XP 2 GHz 1GB 500 MB
Windows 7 2 GHz 1 GB 1 GB
Windows 8 2 GHz 16 GB 2 GB
Windows 10 2 GHz 16 GB 2 GB

Page 29
Networking
2019
2. Server software: It is a type of software that is designed to be used, operated and managed
on a computing server. It provides and facilitates the harnessing of underlying server
computing power for the use with an array of high-end computing server and functions.
Some of the best server software’s are, Home Server Software-2015, Ubuntu Server,
Amahi Home Server, FreeNAS, etc. The hardware requirements of server software are:

Operating System Processor RAM Hard disk


Windows XP 2 GHz 1GB 1.5 GB
Windows 7 2 GHz 1 GB 1 GB
Windows 8 2 GHz 16 GB 16 GB
Windows 10 2 GHz 16 GB 16 GB

3. Client Operating System: Client operating system is a system that works within computer
desktops and other portable devices such as laptops and smartphones. It can manage
different hardware components connected to it like printers, monitors and cameras. It
obtains services from a server and can serve only one user at a time. For e.g. Windows,
Android, Mac.

Hardware Requirements
Processor 1 GHz or higher

Hard disk 16 GB for 32 bit and 20 GB for 64 bits


RAM Depends upon bit of operating 1 GB for 32 bit and 2 GB for 64 bits
Display 800x600

4. Server Operating System: Server operating system is an operating system that operates on
the server. It is an advanced version of an operating system that has more features and
capabilities to provide various services to other devices or client machines connected to it.
In server operating systems, most processes execute from the OS commands. It provides

Page 30
Networking
2019
services to multiple clients or end user devices and runs on a server. It can serve multiple
client devices and consists more features. For e.g. Red Hat Enterprise, Linux, Windows
Server and Mac OS X Server.

Hardware Requirements
Processor 64 bits
Hard disk 1.4 GHz
RAM 512 MB
Display 32 GB+

SOURCE FROM: (Lithmee, 2018)

5. Firewall: A firewall is a software program that prevents unauthorized access to or from a


network. Firewalls are tools that can be used to enhance the security of computers
connected to a network, such as LAN or the Internet. They are an integral part of a
comprehensive security framework for our computer.

Firewall Processor RAM OS


500 log/sec and 8 GB and 16 GB for
2008 R2, 20012
greater 3.5 GHz more than 500
R2 etc.
than 500 log/sec log/sec

We can say hardware and software as the heart and soul of a computer. (Das, 2018)Hardware is a
physical device where software is a code. Workstation hardware and network software are
interdependent with each other. Without software, a computer is of no use because it is a
processing device. Just like a heart is important for a human, similarly software is a life of
hardware component. Hardware and software cannot work separately, in order to obtain any result
they must work together. When there is no proper instructions given, the hardware cannot be used

Page 31
Networking
2019
and is useless. To get a selected job done on the pc, the relevant software package has to be loaded
into the hardware.

Types of server and selection of server


Introduction
I am fully enthusiastic to explore a range of server types and select the server for the company that
I’m employed at. Since, I’m an employee in LANDMARK IT Pvt. Ltd I must choose server that
should perform efficiently and work in smooth pace. When looking at purchasing any brand of
computer we can hear good and bad facts about that stuff. Regardless if the story is good or bad,
these stories are always based on the experience of the user. Purchasing a server for any company
is a very big decision, and if not done properly, it can reduce productivity or cause loss of money
in business.

As LANDMARK is a new IT Company that’s why, I’m tempting on cloud-based servers, because
it can give us more control and security over our business. The servers that I’ve found appropriate
for the company are:

Dell PowerEdge T30


Features:

CPU Intel Xenon E3-1225 v5

Graphics Intel HD Graphics P530

RAM 64 GB

Page 32
Networking
2019
Storage Up to six SATA HDD

Connectivity 10 x USB ports, HDMI, Display Port, VGA, serial, PS2,


Gigabit Ethernet

Dimensions (W x D x H) 17.5 x 43.5 x 36cm

There are so many different servers out there, and that


means that we sometimes have to sort through entire
price lists in order to find the best small server for us.
Dell PowerEdge T30 – we can buy it either as a
barebones or as a fully configured server. Aimed at the
entry-level/SoHo market, the T30 manages to fit in a
ton of expansion potential into a tiny, mini-tower-like
chassis, and it even comes with a wealth of server
features by default, which makes it a perfect alternative
to an office workstation.

I am thinking to shop Dell PowerEdge T30 from EBay, and its price on EBay is US
$388.99

Dell PowerEdge T20


Features:

CPU Intel Pentium G3220

Graphics Intel HD Graphics

RAM 4 GB

Storage No drivers included

Connectivity Up to 12 x USB ports (4 x USB 3.0), 2 x Display

Page 33
Networking
2019
Port, VGA, serial, 2 x PS2, Gigabit Ethernet
Dimensions (W x D x H) 17.5 x 43.5 x 36cm

Dell Power Edge has been benefited from a wealth of knowledge


derived from the 20 years of experience Dell has building
servers. While the barebones version doesn't have a hard drive,
it's certainly cheap – in the recent past, it has been priced at less
than £100 (with cashback offers, that is – it’s always well worth
keeping an eye out for these). It has a Haswell-based Pentium
processor that can clock up to 3GHz and supports up to 32GB
DDR3 ECC RAM (note that this model comes with 4GB).
Expansion capabilities include four SATA ports (32TB if you
use 8TB hard drives), four I/O slots and 10 USB ports.
Astoundingly for a PC of this price, you also get two Display Port connectors, a VGA one, two
PS2 and one serial port. Other than a Gigabit Ethernet port, the other points of interest are a 290W
PSU and an Intel-based RAID controller.

HP Proliant Microserver Gen 8


Features:

CPU Intel Celeron G1610T

Graphics Matrox G200

RAM 4GB

Storage No Drives included

Connectivity 4 x USB 2.0, 2 x USB 3.0, VGA, 2 x Gigabit Ethernet

Dimensions (W x D x H) 23 x 24.5 x 23cm

Page 34
Networking
2019
HP Enterprise's Proliant Microserver Gen8 has
successfully managed to fend off competition – thanks
to an attractive feature mix and plenty of discounts – and
ultimately own this market. These tiny servers have
found a market well outside their niche with prosumers
buying them en masse and touting their obvious
advantages over NAS (network attached storage).
Despite being very small (less than 13l in volume) and
light (less than 7kg), this machine packs some
impressive capabilities. We're talking support for Intel's Xeon E3 family, up to 16GB of RAM, on
system management processor, two Gigabit Ethernet ports, one PCIe slot, support for RAID
0/1/10, a DVD writer, up to four hard disk drives, an internal micro SD card slot, an integrated
Matrox G200 graphics chip and seven USB ports. It only has a VGA port, though, and has just
two memory modules.

About the servers


As I’ve chosen the cloud servers for LANDMARK, I think these servers are quite effective and
works efficiently. I’m sure these servers are worth using and gives the better product as result.
Among these three that I’ve described and chosen for the company are the best selection which
can handle all other client computers. Managing the network system of the company is a key task
of network administration and so is choosing the server. Analyzing all the servers, in my point of
view Dell PowerEdge T30 is better for landmark. The company has to perform a lot of multiple
tasks so it has no any review of low performance of less security. I mean Dell PowerEdge T30 is
relevantly high in its performance and has security options.

Conclusion
I had chosen three cloud servers for LANDMARK, and as I’ve already mentioned that choosing
and purchasing server for a company is a very big decision, and if not done properly, it can reduce
productivity or cause loss of money in business. That’s why with an excellent knowledge of
servers and verifying all the essentials about Dell PowerEdge T30 I finalized to purchase it,
regarding its price and performance.

Page 35
Networking
2019

Part 3
Design a networked system to meet a given specification.

Test and evaluate the design to meet the requirements and analyze user feedback.

Install and configure network services and applications on your choice.

Design a maintenance schedule to support the networked system.

Introduction
In this task, I have designed a network system model that helps to demonstrate the devices, system
and technology that are used in LANDMARK IT Company for their network system. Various
server technology along with networking devices and network components are described below. I
have designed a network system of LANDMARK IT Company with the help of Visio tool.

Page 36
Networking
2019

Assigning IP Address:
Server IP Address Subnet Mask DNS IP Gateway
DC(primary DNS) 10.10.10.11/24 255.255.255.0 10.10.10.2/24 10.10.10.1/24
DHCP 10.10.10.12/24 255.255.255.0 10.10.10.2/24 10.10.10.1/24
VPN 10.10.10.13/24 255.255.255.0 10.10.10.2/24 10.10.10.1/24
WDS(head office) 10.10.10.14/24 255.255.255.0 10.10.10.2/24 10.10.10.1/24
DC(secondary 10.10.10.15/24 255.255.255.0 10.10.10.2/24 10.10.10.1/24
DNS)
FTP 10.10.10.17/24 255.255.255.0 10.10.10.2/24 10.10.10.1/24

Page 37
Networking
2019
Print(head office) 10.10.10.18/24 255.255.255.0 10.10.10.2/24 10.10.10.1/24
IIS 10.10.10.16/24 255.255.255.0 10.10.10.2/24 10.10.10.1/24
RRAS(head office) 10.10.10.19/24 255.255.255.0 10.10.10.2/24 10.10.10.1/24
RRAS(branch 10.10.10.20/24 255.255.255.0 10.10.10.2/24 10.10.10.1/24
office)
CDC 10.10.10.10/24 255.255.255.0 10.10.10.2/24 10.10.10.1/24
WDS(branch 10.10.10.22/24 255.255.255.0 10.10.10.2/24 10.10.10.1/24
office)
Print(branch office) 10.10.10.1/24 255.255.255.0 10.10.10.2/24 10.10.10.1/24

Devices and Services used in this design


Domain Controller (DC)
A domain controller (DC) is a server that responds to security authentication requests within a
Windows Server domain. It is a server on a Microsoft Windows or Windows NT network that is
responsible for allowing host access to Window domain resources. In Domain Controller server all
the user have authorized to use. The domain then check the user identity, usually by confirming a
username and password, then approves requests for access accordingly. And I have used this
server to the same purpose i.e. for security purpose. Since LANDMARK has 20 branches, I need
to check the network system accordingly so that I can apply the permission and the security.

Dynamic Host Configuration Protocol (DHCP)


A dynamic host configuration protocol is a server which is used to provide a unique IP address
and automatically configure the other network information. DHCP automatically allocates the IP
address to the client computer or printer linked within the network and all their devices. Without
an IP address it cannot be access the data. DHCP is used for issues the IP address to access the
network between the client to server. We use DHCP server because it gives every host that is
connected to the network with its own unique IP address. As being an IT administrator, I assign IP
address to all the computer using DHCP. It provides all the configuration to the computer. It was
so much time consuming static IP to assign in all the computers in the network. So the assigning
IP address by implementing DHCP minimizes the work hour and increases the efficiency.

Page 38
Networking
2019
Windows Deployment Services (WDS)
The Windows Deployment Services server role allows us to deploy Windows operating systems to
client and server computers. In the IT sector there are many computer which we need to install
operating system each of computer it can take lot of time so, WDS can be used to arrange
Windows at same time with each of computer remotely through the server. If we kept on installing
windows on each computer it will consume much amount of time which is the waste of time. But
with the help of this WDS we can install windows in all computers at the same time remotely
through the server which saves the time and effort. Due to this reason, I have decided to provide
the WDS in the network design of LANDMARK IT Company.

Virtually Private Network (VPN)


Virtually Private Network is used specially for the security by hacking and cracking. It allows to
generate a secure connection to another network over the Internet. In IT Company there are a lot if
staff or officer who had hand all IT problems, which is only conceivable by IIS so it has high
possible to hack the entire system of company so I used VPN due to its tunneling system and all
the data are transferred by encapsulation system which is most difficult to hack for the hacker.

Firewall
Firewall is a software which is used to maintain the security of private network to control the
incoming and outgoing network traffic. In company there are daily transaction between client
which is very harm to the system and all the transaction are filter by the firewall to protect from
the viruses and if these data are ruined or destroyed then LANDMARK can have millions and
billions of loss so firewall is used to filter the data transaction to protect from virus. So, to protect
the transaction data from the hacking or for any other reason I used the firewall in this networking
system.

Switch
A switch is the hardware devices that joins the multiple computers together and devices. In IT
sector there are different types of devices which can be found in all the devices and are connected

Page 39
Networking
2019
to the small devices like CCTV, printer, computers and printer which is connected to the same
network. Most switches are active, they electrically amplify the signal as it moves from one
devices to another. So, in order to connect these devices in a same network I have mentioned the
Switch in this network design.

Router
A router translates information from one network to another. It is similar to a super intelligent
bridge. Router select the best path to route a message, based on the destination address and origin.
The router can direct traffic to prevent head-on collisions and is smart enough to know when to
direct traffic along back roads and shortcuts. While bridges know the addresses of all computers
on each side of the network, routers know the addresses of computers, bridges and other routers on
the network. Routers can even listen to the entire network to determine which sections are busiest,
they can then redirect data around those sections until they clear up. Router can direct signal
traffic efficiently. It can messages between any two protocols. So, to communicate among the
network system of the branch offices and the head office I have mentioned the router in this
network design.

Domain Name System (DNS)


DNS (domain name system) is the server which is used to translate host name into IP address.
Every other website name is only used for our convenience because it's much easier to remember
those names than to remember their IP addresses. Every computer, node, device or resource on the
internet has a unique name and unique IP address. In some sector there are hundreds of such
devices or resources. Computers communicate on the internet using the machine-readable IP
addresses.

Access point
Access point is a network device that helps to attach the wireless Wi-Fi devices with the wired
network system. Access point allocate the hotspot range through which Wi-Fi devices could
connect to it. In the company there are many staffs who have dissimilar wireless devices like
Mobile phones, Laptops etc. and also bank could have its own wireless devices like wireless
camera, wireless printers etc. these devices are needed to be connected with the network system of

Page 40
Networking
2019
the bank. So, in order to connect these devices with the network of the bank I have declared the
Access point in the design of the network system for this bank.

Testing and evaluating the design.


INTRODUCTION
In the network design of LANDMARK IT Company, I’ve used servers like DC, DHCP, DBS,
WDS, RODC, CDC, IIS and print server. So in this task I’ll test all the servers to analyze whether
the servers works properly or not.

S.N. Test Expected result Actual result Description


Performed
1. DC To monitor and Controls all the It functioned properly
control all others clients and manages as expected.2
clients in the network. the clients.
2. DHCP Assigning IP address It provides dynamic Client was successfully
to client computer IP to client computers assigned
automatically. from the scope range.
3. Print Server Single printer should Print server was able Client computer was
be able to print the to print the document connected to the printer
documents of entire using server and was able to print the
client computers. computer. documents.
4. DNS Server Registering specific IP Registration of IP Assigning of IP address
to the website. address to the website and website name was
was achieved. done in various zone of
DNS.
5. IIS At the time of Browse the website Browsing the website
browsing content of where web contents with web content was
website needs to be are transferred. met.
transferred.
6. RODC It needs to show the Viewing the files of Expected result was met

Page 41
Networking
2019
files that has been primary domain. by assigning static IP to
listed in primary it.
domain.
7. CDC Creating updating and Updating, creating Expected result was
deleting of files in deleting of files in the achieved.
branch office with the branch is done with
help of CDC. the help of CDC.
8. WDS Providing image files Client computer of Image file was
to the client computer the network was transferred to the client
in the network. provided with an computers and expected
image file of result was achieved.
operating system

For LANDMARK IT Company, I have designed a network diagram

Evaluation
DC was used in the network design to fulfill the requirement of clients. As DC provides facilities
to create and manage users and groups. It also helps to apply log on to hours and log on to policies
to the client computers. Similarly, DHCP enables to assign dynamic IP to the client computers. At
the time of evaluating client computer was assigned dynamic IP with the help of DHCP. To
provide IP address to the web website DNS was used and able to provide IP to the website. I used
print server in the design of my network, it was very productive as all the client computer was able
to use the single printer. At the time of evaluating RODC, CDC and WDS all were performing
their work effectively. RODC were used to view the files of PDC and cannot make any change but
can request PDC to make changes in the files. RODC need to be assigned static IP to view from
the primary domain. CDC is used in branch office and was able to create, delete and update files in
the branch office. I deployed in my network design with WDS which helps to create image files.

Page 42
Networking
2019
Feedback form
Name: …………………………………………………………………....

Address: ………………………………………………………………….

Qualification: ……………………………………………………………..

Contact No: ………………………………………………………………

E -mail address: …………………………………………………………..

Tick on the suitable box according to your own view:

 How is the network design?


 Good
 Better
 Best
 Does this network design of LANDMARK meet the requirements?
 Yes
 No
 How is the network security?
 Good
 Better
 Best
 How is the performance of various servers?
 Good
 Better
 Best

Analyzing Feedback
As I collected feedback from 10 different people, I found that all the staff of the company are
happy from performance, security and work efficiency of various server. 92% of the company
staff are satisfied with the network model that I made but the rest of 8% were unsatisfied as they
were the person with high expectation. Most of the staffs were happy as they are able to do their
task easily as all the system are managed well and maintenance. Detecting problems were very

Page 43
Networking
2019
easy so they are highly dedicated to their job. The response from them highly motivated me but
few were not so satisfied due to delay. All the features required by the bank along with high
performance made all the worker happy. I analyzed the user feedback and I got chance to improve
my network system. In the near future, we can avoid the problem of network traffic by using a
large network system and high configuration than that we are using now. Most of the user were
happy as all their requirements was met within the allocated time. Collecting the feedback made
me more concerned about network traffic problems but all others features that I introduced
perfectly matched the company requirements.

Maintenance schedule to support a networked system.


Network system needs maintenance time and often for its smooth operation. In the context of
LANDMARK IT Company the network system needs some maintenance like upgrades, security,
backups and auditing so that system will work properly. In this task, I have listed my schedule for
maintenance:

Back up
It is the process of copying file into an archive file of the computer data so that it may be used to
restore the original after data loss event. It refers to make copies of data or data files to use in the
event the original data or data files to use in the event the original data or data files are lost or
destroyed (Anon., 2015)

Security
Server security is the protection of information assets that can be accessed from a server. Server
security is important for any organization that has physical or virtual server connected to the
internet. Server security comes to being confidentially, integrity, availability of appropriate
information and authentication. (Chacko, 2017)

Page 44
Networking
2019
Upgrade
Upgrading a network system will meet the requirement of any organization. Network upgrade
helps to enhance performance, reliability and security. Upgrading system increase performance,
reliability and security. Upgrading the network system in the company helps in smooth operation.

Audit
Auditing in network field means it is a process of analyzing the network both in terms of hardware
and software. Being an administrator, I need to know the machines used and devices connected to
the network. Auditing helps to check the user accounts and groups on the network. Auditing
security regularly helps to detect potential theft.

Maintenance schedule
Time Date Day Work Performed
5:00-5:30 pm 2019/9/9 Friday Starting System
5:30-6:00 pm 2019/9/9 Friday Checking the network system.
6:00-6:30 pm 2019/9/9 Friday Login user computers and
checking for errors.
6:30-7:00 pm 2019/9/9 Friday Break time
7:00-8:30 pm 2019/9/9 Friday Software updates including
checking security, updating
firewalls.
8:30-9:15 pm 2019/9/9 Friday Checking whole system
9:15- 10:00 pm 2019/9/9 Friday Preparing backup

Network system need time an often maintenance to boost the performance and thinking this in
mind I, being a system administrator of LANDMARK IT Company I carried out maintenance
session considering backups upgrades, security and auditing. No network system is perfect so at
the time of configuring hardware, software and other devices there may occur an error so to
minimize those error maintenance is required.

Part 4
Page 45
Networking
2019
Implement a networked system based on a prepared design.

Document and analyze test results against expected results.

Recommend potential enhancements for the networked systems.

Use critical reflection to evaluate own work and justify valid conclusions.

Implementation
In this task I am going to make a report on the various servers that I used for my network design of
LANDMARK IT Company. Being an IT administrator of LANDMARK I have a task to install
and manage it. For the installation of server, I have used VMware Workstation.

Lab Report

1) DC

Definition: - A domain controller (DC) is a server that responds to security authentication requests
within a Windows Server domain. It is a server on a Microsoft Windows or Windows NT network
that is responsible for allowing host access to Windows domain resources. A domain controller is
the centerpiece of the Windows Active Directory service. It authenticates users, stores user
account information and enforces security policy for a Windows domain.

Requirements: Server OS, Static IP, Active Directory Domain Software, Administrator Logon
with strong password.

Page 46
Networking
2019

SN Steps Screenshots
1) Go to start and click on
Server Manager then a
dashboard appears and
click Add Roles and
Features.

2) Then on Add Roles and


Features wizard, select
Installation Type and
select ‘role based or
feature based
installation’ and click in
next.

Page 47
Networking
2019
3) Then on Server
Selection click, select a
server from the server
pool and next.

4) On Server Roles click


in Active Directory
Domain Server, Add
Roles and Features
windows will pop up
and there click on Add
Features and then ‘next’
for three times.

5) After the thrice next


we’ll see confirm
installation selections
so click ‘Install’.

Page 48
Networking
2019
6) After Installation, click
on ‘Promote this server
to a domain controller’
else it can be
configured from main
dashboard clicking on
the warning sign.

7) Then Active Directory


Domain Services
Configuration Wizard
appears and select ‘add
a new forest’ and give a
domain name and click
next.

Page 49
Networking
2019
8) Fill in the password and
confirm it to proceed to
next. Then click next
for two times.

9) The NetBIOS name


appears automatically
and after that click on
next for three times and
then install.

Page 50
Networking
2019
10) After the completion of
installation of Dc,
check the computer
properties. If there is
domain name, the
computer is a domain
controller.

2) DNS

DNS stands for Domain Name Server; it is a type of system server which is used to assign IP
Address, to the website. DNS translates Internet Domain and host names to IP address and vice
versa. On the internet, DNS server automatically converts what we type in our Web browser
address bar to the IP addresses of Web servers hosting these sites.

Requirements: - Server OS, Static IP, DHCP Server Services.

S.N. Steps Screenshots

Page 51
Networking
2019
1) First, open Server
manager and add roles
and features. For DNS
server, click on DNS
server and then add
features and install it.

2) After the completion of


installation, go to
server manager and
Select tools and then
select DNS.

3) In DNS manager, first


click on forward
lookup zone then Right
click on it and choose
New Zone.

Page 52
Networking
2019
4) Click next for three
times.

5) Write down the zone


name and click next for
two times.

6) Click on Finish.

Page 53
Networking
2019
7) Now, Right click on
reverse lookup zone
and select new zone.

8) Next for four times.

9) Assign the network id


and click next for
continuously 2 times
and then Finish.

Page 54
Networking
2019
10) Enter ncpa.cpl on Run
and open Ethernet
properties, click on
Advance properties.
Select the option ‘Use
the following IP
addresses.

11) Click on IP setting; add


TCP/IP address has to
be the same that we
assigned in reverse
lookup zone. Then
click OK continuously.

12) Now return back to


forward lookup zone.
Right click on it and
new host and then fill
www in name and
provide IP address to
the new host.

Page 55
Networking
2019
13) A message pop ups
showing the host was
successfully added.
This means that we
have assigned IP
address to the website.

3) IIS: IIS Server is a program that uses HTTP (Hyper Text Transfer Protocol). It is used for
hosting websites and other content on the Web. Microsoft's Internet Information Services provides
a graphical user interface (GUI) for managing websites and the associated users.

Requirements: - Server OS, Static IP, Internet Information and Services.

S.N. Steps Screenshots


1) Click on add roles and
features from the
dashboard of server
manager.

Page 56
Networking
2019
2) After executing 2 or 3
steps on server select
Web Server (IIS) and
click on add features
and then next.

3) After the two next, in


server roles select Web
Server (IIS) and click
next.

Page 57
Networking
2019
4) After some successful
‘next’ click on add
features of add roles
and features.

5) Web Server (IIS) is


being installed and
then after the
installation click on
close.

Page 58
Networking
2019
6) Now in the dashboard
click on tools and
select Internet
Information Service
(IIS) Manager.

7) There we can see this


type of windows, then
expand the site in the
connections pane in the
left corner.

Page 59
Networking
2019
8) Right click in site and
select Add Website.

9) Now provide a site


name, its physical path
and host name and IP
address assigned in
DNS.

Page 60
Networking
2019
10) So, while filling in the
Add Website form we
need to add the
physical path. So
before that open file
explorer and in Local
Disk C: make a folder
and inside that folder
make a text document
texting something
about the site name.

Page 61
Networking
2019
11) So again back in the
site name, click it in
and open the default
document. In default
document there are
various files are seen
so remove all those.

12) Now, open the Internet


Explorer and enter the
site name of the IP
address provided to the
site name.
So, finally we can see
the text document in
Internet Explorer after
accessing the site name
or IP address.

4) DHCP

Page 62
Networking
2019
DHCP stands for Dynamic Host Control Protocol. DHCP server is a type of system server which
assigns dynamic IP address, gateways, subnet mask and other system configuration to client
networking devices automatically. DHCP is mainly used in large scale organizations where more
time will be consumed for assigning IP address and where large computers are in use. By
assigning different IP address to the device connected, DHCP allows them to communicate with
each other.

Requirements: - Server OS, Static IP, DHCP Server Services.

S.N. Steps Screenshots


1) Click on add roles
and features from
the dashboard of
server manager.

2) After executing 2
or 3 steps on
server select
DHCP and click
on add features
and then next.

Page 63
Networking
2019
3) Then click ‘next’
for three times.

4) Tick Restart the


destination server
automatically if
required and Click
Install.

Page 64
Networking
2019
5) After the
installation, go
back to Server
manager and on
tools, choose
DHCP.

6) Click on IPV4 and


right click mouse
and select New
Scope

7) After clicking
New Scope, a
wizard will appear
and click on next.

Page 65
Networking
2019
8) Give the name of
scope and
description and
click next.

9) Assign IP address
range that DHCP
uses to give to
client computers.
Click Next for 2
times.

Page 66
Networking
2019
10) Set lease duration
for the scope and
click Next 6
times.
And finally
‘Finish’

Page 67
11) Finish the new scope
wizard.
Networking
2019

12) Now go to the client


Computer connected to
domain controller and
open Internet Protocol
Properties and choose
Obtain an IP address
automatically.

13) Obtain an IP address


automatically.

Page 68
Networking
2019

5) Print Server: - A print server is a software application, network device or computer that
manages print requests and makes printer queue status information available to end users and
network administrators. (Rouse, 2010) A print server associates printers to customer PCs over a
system and are used in both small and large enterprises.

1) Click on add roles


and features from
the dashboard of
server manager.

Page 69
Networking
2019
2) After executing 2
or 3 steps on
server select Print
and document
services and click
on add features
and then next for
thrice.

3) Select on restart
and install the
print server. After
installation of print
server click on
close.

Page 70
Networking
2019

4) Now, Click on
tools and select
print management.

Page 71
Networking
2019
5) Select Print
Servers and Right
click on host name
and click on add
printer.

6) After adding a new


printer, click next
continuously.

Page 72
Networking
2019
7) After some
successful next,
printer installation
is succeeded. Then
click on finish.

Read Only Domain Controller (RODC)

RODC is that type of domain controller in the Windows Server operating system which assists
Domain Controller that’s why RODC is also called as Assistant domain controller or Helping
Domain. RODC is mainly used to handle the balance of the primary domain controller (PDC).

Requirements:-

S.N. Steps Screenshots


1) First of all, go to
Dc and then Run
and type
‘ncpa.cpl’ to
configure IP
Address.

Page 73
Networking
2019
2) A dialog box will
appear showing
LAN card, right
click that and
select properties
there. Click on
Internet Protocol
Version
4(TCP/IPv4). A
dialog box will
appear and in IP
address provide
the IP address for
DC
(192.168.100.1)
and in preferred
DNS server
provide RODC IP
address
(192.168.100.2).

Page 74
Networking
2019
3) After IP
verification, now
go on dashboard
and clock on add
roles and features.
And click next for
twice.

4) Tick on active
directory domain
services and add
features.

Page 75
Networking
2019
5) Next for twice.

6) Select restart the


destination server
automatically if
required and
Install. After the
installation is
succeeded choose
the close option.

Page 76
Networking
2019
7) After the previous
step, select on add
a domain
controller to an
existing domain
controller and
enter the name of
primary domain
controller and
select.

Page 77
Networking
2019
8) In username type
landmark.com.np
and login to the
Windows Security.

Page 78
Networking
2019
9) Assign Ip and
click next for three
times and then
click on Install in
Configuration
Wizard.

Page 79
Networking
2019
10) Let the system
restart and check.

11) So in this way we


can check in
system properties
and RODC was
successfully
installed.

WDS (Windows Deployment Services)

WDS stands for Windows Deployment Services. “Windows Deployment Services is a server role
that gives administrators the ability to deploy Windows Operating systems remotely. WDS can be
used for network based installation to set up new computers so administrators do not have to
directly install each operating system.” (Rouse, 2017).

Page 80
Networking
2019

Pre requirements:

1. Windows Server 2012


2. Static IP address on server
3. Active Directory Install
4. DNS Server Install and configure
5. DHCP Server Install and Configure
6. NTFS File System Disk
7. Bootable OS ISO File or DVD
8. Administrator User Log in

S.N. Steps Screenshots


1) Click on add roles and
features from the
dashboard of server
manager.

Page 81
Networking
2019
2) Select Role-based or
feature-based
installation.

3) Now, select Windows


Deployment Services
in server roles.

Page 82
Networking
2019
4) After selecting next
for twice, now select
both of these options
and click next.

5) After completion of
installation choose the
close option.

6) After completing the


WDC installation click
on tools and select
windows deployment
services.

Page 83
Networking
2019
7) Right-click your WDS
and then click
Configure Server.

8) Choose the option -


integrated with Active
Directory and click on
next button.

10) Browse the path file


for the remote
installation folder and
click the next button.

Page 84
Networking
2019
11) Wait for configuration
to complete and then
click Finish.

12) Right click on the host


name and click on all
task and restart.

13) So, WDS is


successfully installed.

Page 85
Networking
2019
Recommending potential enhancements
Introduction
New software and various networking devices are invented day by day so, the enhancement that
we
can do being a system administrator is to upgrade the devices and software. We can replace the old
devices with the latest one having more features and performance likewise, we can update our
software to cope with the growing world so being a system administrator, and I wish to upgrade
the following things in my workplace for making better network system. Recommendation of
potential enhancement for the networked system, as being a system administrator of landmark.com
I have designed a centralized network having a connection between head office and its branches.
Various devices with quality software are required for central network and communication. For
potential enhancement for the networked system various things needs to be concerned which are
listed below:

1) Using Server technology


2) Use of router and switch instead of hub.
3) Use of firewall for security purpose.
4) Use of VPN.
5) Branded PC.
6) Genuine operating system.
7) Genuine software.
8) Use of LINUX for servers.
9) Use of print server.

Use of server technology


Server helps to system more reliable as failure of one device would result in a notification, but the
system will not stop operating. Likewise, it is easier to upgrade in terms of disk space, access
speeds
and remote access. Server technology will improve collaboration, without server any business
organization cannot perform well and the main advantages of having server technology is that
management becomes easier. Business holds lots of records and management is done through
server

Page 86
Networking
2019
as server holds all the files and it becomes easier to find files. In server technology all the files are
store in a server so it is easy to perform backup of it and can recover easily. Use of server
technology
is very much essential in institution like bank as server play different roles for different clients or
users.
So, I highly recommend to use server technology than any other technology due to above
mentioned
reasons.

Work evaluation
Introduction:
I have designed a network system and also tested the proposed design. Here in this task I am going
to present about the implementations of the design and all the diagnosis of the implemented
network.
Analyzing the positive as well as negative aspects of the designed network and the final diagnosis
of implemented network are also discussed in this task. None of the network system can be perfect
one so we need to keep changing according the time and we can prove our network system by
using
advance devices and genuine software. Further in this task I have also discussed about the valid
recommendations for the improvement of network system.

Network design

Designing a network and implementing the designed network is a role of IT administrator. Being
an
IT administrator of SBI bank limited I have implemented network system where there is a central
connection between head and the branch offices.

Page 87
Networking
2019

As shown in the figure, I have designed a centralized network system that connects head and the
branch offices. In the designing of network system, I used router, switch, firewall, access point and
printer. Server along with various devices are used for its smooth operation, better performance
and to maintain security. The design includes the IP address that is needed for the better
performance in the administration of landmark. Cable is used to connect computer with switch
which maintains higher level of security. Keeping in mind about the security issue and lanmark
requirements I have designed this sort of network system.
Page 88
Networking
2019

Test Plan
Test plan of networked system includes the test of various servers like DC, DNS, DHCP, Print
server, WDS, RODC and web servers.

S.N. Task Time Date/day


Testing of designed network (day 1) 4 hours (5:00-9:00) 20/08/2019, Monday
1. Test of domain controller (DC) 1 hour 20/08/2019, Monday
2. Test of Dynamic host configuration 1 hour 20/08/2019, Monday
protocol (DHCP)
3. Test of domain naming (DNS) 1 hour 20/08/2019, Monday
4. Test of web server 1 hour 20/08/2019, Monday

S.N. Task Time Date/day


Testing of designed network (day 2) 4 hours (5:00-9:00) 21/08/2019, Tuesday
1. Test of Read Only Domain Controller 1 hour 21/08/2019, Tuesday
(RODC)
2. Test of Print server 1 hour 21/08/2019, Tuesday
3. Test of Windows Deployment Services 1 hour 21/08/2019, Tuesday
(WDS)

I have designed two days test schedule for detecting errors and to increase performance. Before
implementing anything we first need to test whether it will work or not, likewise I first checked
and tested all the systems, I found all the systems well-functioning well and implementing all the
services in Lanmark IT Company. So it took me 2 days to complete all the testings’ and I spent 4
hours each day; on the first day I checked DNS, DC, DHCP and web servers. Similarly, on the
second day I tested RODC, Print server and WDS.

Page 89
Networking
2019

Implementation of network design


Being an IT administrator of LANMARK IT Company, I have implemented network system
considering IP address, server system, various other servers, network devices, security devices.
Servers and all other devices are connected with each other so that they can function well. In have
used firewall as means of security devices which helps to filter unnecessary packets to enter into
systems. Likewise, switch is used instead of hub to avoid data collapsing problem. Print server is
also implemented to minimize the cost of the company.

Positive aspects of designed network

1) Due to centralized network system file, data and information can be sent from branch to
head and head to branch offices.
2) Easier to perform backup.
3) All the data are stored in head office so, if any damage or loss of the data occur can be
used in the head office.
4) Use of firewall and switch has made system more safe and secure.
5) Less chance of system failure.

Negative aspect of designed network

1) Expensive network system.


2) Need of IT expert to handle.
3) Failure of server hampers the whole network system.
4) Difficult to configure different servers.

Conclusion and Recommendation


Before implementing any system, we first need to test and verify it. Testing helps to find the error
and also identify security threats. If testing of network system is conducted successfully then we
can implement it. Being an IT administrator of LANMARK IT Company, I have analyzed the
network system applied to LANMARK and I found more positive aspects. And I’d like to
recommend some points for the enhancement of network system:

Page 90
Networking
2019
1) For the data security of LANMARK IT Company there needs to be advanced security
devices installed.
2) Use of genuine software.
3) There needs to be time and often maintenance of system which includes checking
software’s and uploading it.
4) Advance networking devices should be used for transferring data faster.
5) Using advance server operating of latest version.
6) Use of high configuration server which boosts the productivity of company.

Documenting and analyzing test results against expected results.


In this task I am going to test the servers I have installed in order to establish the network in
LANMARK IT Company.

1) Domain Controller (DC)

S.N. Test Date What was tested? Expected output Actual output
1. 2019/08/20 Applying policies to In the server there The client computer
the users and groups. needs to be would be the
lanmark.com.np as member of the
domain name and domain named
policies needs to be lanmark.com.np.
applied on the users
and groups.

Page 91
Networking
2019

2) Domain naming server (DNS)

S.N Test Date What was tested? Expected outcome Actual output
.
1) 2019/08/10 DNS was tested to Installation of DNS DNS was successfully
assign an IP address should be able to installed and provided
to websites. provide IP address IP address to websites.
to websites, it must successfully ping from
be ping from IP as well as domain
domain name and name
from IP address.

Page 92
Networking
2019

3) Web server (IIS)

S.N. Test date What was tested? Expected output Actual output
1. 2019/08/20 Web server was Web server needs Web server was
tested was tested for to be installed and installed and web
transferring content web site should be content was also
of the website. created and web shown.
content should be
shown.

Page 93
Networking
2019

4) Dynamic host configuration protocol (DHCP)

S.N. Test date What was tested? Expected output Actual output
1. 2019/08/20 DHPC was tested to Installation of DHCP server was
assign IP address to DHCP server should installed successfully
client computer. be able to assign and assigned dynamic
dynamic IP to the IP as per client
client. requirements.

5) Print server

S.N. Test date What was tested? Expected output Actual output

Page 94
Networking
2019
1. 2019/08/20 Print server was Computer connected As expected files and
tested to print to the network must documents were
document files of use single printer to printed by the printer
client computers print the files and of the client
connected in the document. computer connected
network. to the network.

6) Read Only Domain Controller (RODC).


S.N. Test date What was tested? Expected output Actual output
1. 2019/08/20 Test of RODC was Viewing and checking As expected, files
carried out to view the files and were checked along
the changes made documents that is with users and
by PDC in the files. being changed by groups.

Page 95
Networking
2019
PDC.

7) Windows deployment service (WDS)

S.N. Test date What was tested Expected output Actual output
1. 2019/08/20 Deployment image file It needs to be able WDS was able to
of operating system to to deploy image deploy image file
client computer. file to client successfully.
computers.

Page 96
Networking
2019

Bibliography
Anon., 2015. technopedia. [Online]
Available at: www.technopedia.com
[Accessed 10 September 2019].

Batool, A., 2011. DesktopClass.com. [Online]


Available at: http://desktopclass.com
[Accessed 23 August 2019].

Chacko, B., 2017. Quora. [Online]


Available at: www.quora.com
[Accessed 12 September 2019].

Das, D., 2018. cse tutor. [Online]


Available at: https://www.csetutor.com
[Accessed 4 September 2019].

Kearky, T., 2017. comparitech. [Online]


Available at: https://www.comparitech.com
[Accessed 28 August 2019].

Kishore, A., 2017. The Backroom Tech. [Online]


Available at: https://thebackroomtech.com/2017/09/13/setup-vmware-workstation-server-connect-
shared-vms/
[Accessed 3 September 2019].

Lithmee, 2018. Pediaa.Com. [Online]


Available at: http://www.pedia.com
[Accessed 4 September 2019].

Mullins, D. P., n.d. Creative Commons Attribution. [Online]


Available at: http://cs.sru.edu/~mullins/cpsc100book/module02_introduction/module02-

Page 97
Networking
2019
03_introduction.html
[Accessed 3 SEPTEMBER 2019].

Rouse, 2017. [Online].

Tonnau, S. Y., 2002. A Tech-ICT document. [Online]


Available at: http://www.tech-ict.com
[Accessed 23 August 2019].

Page 98

You might also like