Uploaded by harshana wijayarathna

network-1sm

advertisement
lOMoARcPSD|19511684
Network 1sm
Networking Principles (Leeds Beckett University)
Studocu is not sponsored or endorsed by any college or university
Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)
lOMoARcPSD|19511684
Task 1 P1:
Discuss the benefits and constraints of different network types and standards.
Introduction:
It is all about the explanation of the various types and standards of the network as well as their
advantages and limitations in this task. A network is a collection of connected computers,
servers, mainframes, network devices, peripherals, or other devices to allow data sharing. On the
network there are different types of systems: peer-to-peer, client-server, cloud, cluster,
centralized, virtualization, etc., and OSI model, TCP/IP model, standards such as IEEE, 802.x are
different types of network standards.[CITATION Com \l 1033 ]
Peer Based:
A peer-to-peer network is the assembly of computers, each of which acts as nodes for file sharing
in a group. In this, each computer acts as a server for storing files in it. He does not have a
central computer or a dedicated server.
Benefits of the peer based network:
There is no need to buy an expensive server. A network manager is not required, since each user
controls their own computers. No technical knowledge is required. In the client-server there is
less chance of network traffic.
Constraints of peer based network:
Each computer must run more than one role, so you can print or share files that increase the load.
The organization of data storage does not exist, since the data can be stored on any computer
connected to the same network. Each computer needs its own backup.
Client server:
Each computer must have more than one role, so you can print or share files that increase the
load. The organization of data storage does not exist, since the data can be stored on any
computer connected to the same network. Each computer needs its own backup.
Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)
lOMoARcPSD|19511684
Benefits of the client server:
Data and other resources can be updated. New clients or server can be added at any time. He can
easily service.
Constraints of the client server:
A huge number of clients send requests to the same server at the same time, which can cause
problems. It does not have the reliability of the network. The client may not have the resources
that existed on the server
Cloud:
A cloud is an unpredictable part of a network through which one or more network resources are
searched or implemented. This requires the exchange of some or all of the network operations to
the cloud computing network. (Networkskyx.com, 2019)
Benefits of the cloud networking:
The most significant advantage is reducing IT costs. It is much more reliable and consistent on
the service management platform. It provides maintenance capabilities through centralized
administration of resources
Constraints of the cloud networking:
There are many times when this system can have some sincere malfunction at a time when data
can be picked up anywhere at any time. It can transfer confidential company information to a
third party (a cloud service provider).
Cluster:
A server group that behaves as one system and has a high enable ability that is connected
through a LAN is called a cluster. This is the logical unit for storing files and data on the hard
disk, which is organized by the operating system of the computer (operating system).
Benefits of the cluster networking:
This reduced the single point of failure due to the functionality of switching the virtual Exchange
server. With limited downtime, it has a high ability to perform maintenance and upgrades.
Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)
lOMoARcPSD|19511684
Constraints of the cluster networking:
It shares storage errors. It also does not serve network services. It shows the error in working
order. Otherwise, an unnecessary geographically distributed solution for clustering was
implemented as a result of disaster sites.
Centralization:
This is the type of computational architecture on the central server on which all or most of the
calculations are performed, which is the acting agent for all communications.
Benefits of the centralization:
This helps reduce costs, because more equipment and machines are not supported. Improved data
security. It consists of processing in centralized processing systems.
Constraints of the centralization:
The data are independent of each other for other information systems. Huge data storage is
necessary in the central information system, which will help to reduce local accountability.
Transactions are very expensive to transfer.
Virtualization:
It describes the formation of a virtual resource, such as a computer / desktop, operating system
(OS), server, network or file. This is a storage device or network resources. Its main goal is to
make it more scalable by managing workloads by converting traditional computing.
Benefits of the virtualization:
This makes the reformation very fast and accurate, with limited frames and equipment share - all
this is virtually. He performed more efficient IT operations.
Constraints of the virtualization:
Since it does not require the installation of hardware components, it is a cheaper system for
implementation. This reduces the load. This allows you to quickly deploy resources. It offers the
best uptime.
OSI model:
This is a related model for how the application connects over the network through systems that
are open to connect and communicate with other systems. This is the conceptual basis for
Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)
lOMoARcPSD|19511684
understanding relationships, therefore it is divided into seven components or layers, each of
which has different types of services that should be provided to the layers above and below.
Layers and components:

Physical layer

Data link layer

Network layer

Transport layer

Session layer

Presentation layer

Application layer
Benefits of the OSI model:
It is considered a standard model in computer networks. It provides a wide range selection. It
does not lie on a particular computer system that must be executed. For security reasons, the data
is encrypted. In this OSI model, just add a few network models.
Constraints of the OSI model:
Data integrity is not required in many applications that are supported by the OSI model. OSI
needs to be understood between the three parties that are users and the service provider, for a
quicker setup. It is difficult to understand, because it is a complex model.
TCP/IP model:
This means the transmission control protocol / internet protocol. This is the language in which
Computer \ PC users come to the Internet, which can be worn as a communication protocol on a
private network. It works under four layers. They are:

Application layer

Transport layer

Internet layer

Network Access layer
Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)
lOMoARcPSD|19511684
Benefits of the TCP/IP:
This means the transmission control protocol / internet protocol. This is the language in which
Computer \ PC users come to the Internet, which can be worn as a communication protocol on a
private network. It works under four layers.
Constraints of the TCP/IP:
It is difficult to organize and maintain. IPX is much faster than the TCP / IP model. Small TCP /
IP is higher than IPX.
Conclusions:
Consequently, I have discussed different types of systems such as peer - to - peer, client - server,
cloud, cluster, etc., as well as network standards such as OSI model, TCP / IP model, etc., and
their benefits and constraints.
T2/P2
Explain the impact of network topology, Communication and bandwidth requirements.
Introduction:
The impact of network topology, Communication and bandwidth requirements have been described here.
A network topology is a schematic definition in which the network location along the connection
lines, including and attached to different nodes (the sender and the receiver). Network topology
is the interconnected example of system components (Revolvy, 2019).
The volume of data that can be transferred across a network at a given time is called its bandwidth. An
expensive, high bandwidth network is able to transfer data much quicker than a low bandwidth one. The
bandwidth is effected by the types of network cards and modems used as well as the amount and type of
cable used.
A Network topology might be physical, mapping equipment setup, or coherent, mapping the way
that the information must take so as to go around the system.
Physical topology refers to the physical design of the network, while logical topology refers to how data
is handled within the network regardless of its physical topology.
There are six topologies of the Physical Topology : bus topology, star topology, ring topology,
topology of the grid, topology of the tree, and topology of the hybrid. In the context of a
computer network these are different topologies. There are many distinguished topologies yet
they are not exacting, which implies that any of them can be joined. Be that as it may, every
topology has an alternate standard and may utilize distinctive equipment techniques so they are
not exchangeable.
Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)
lOMoARcPSD|19511684
BUS Topology:
A bus topology is a topology for a Local Area Network (LAN) in which every one of the hubs are
associated with a solitary link. The link to which the hubs interface is known as a "spine". On the off
chance that the spine is broken, the whole section falls flat. Bus topologies are generally simple to
introduce and don't require much cabling contrasted with the options.
In this topology organize messages are sent to every terminal on the system - so on the off chance that one
of the terminals breaks, at that point the others are not influenced. In the event that you need to
communicate something specific from PC A to PC B then every one of the PCs will get the message,
anyway in light of the fact that you have included PC B's location, just PC B will lift it up and show it.
Like the ring topology there is no extraordinary PC on this system. It is famous in light of the fact that it
is a straightforward just as a generally shabby and dependable topology.
Fig: Bus Topology
The advantages and disadvantages of bus topology is described here.
Advantages
Disadvantages
It is cheap and easy to implement.
when computers are added or removed networks
Less cable is required.
get disrupted.
A break in the cable will prevent all systems from
It does not use any specialized network
accessing the network.
It is difficult to troubleshoot.
equipment.
RING Topology
Every PC is associated with another PC that shapes a ring structure, with the last PC associated
with the principal PC. For every gadget there are actually two neighbors. In view of the Token
Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)
lOMoARcPSD|19511684
Ring Mechanics, every PC is associated with a ring structure that exchanges what originates
from the past PC in the line. While interfacing PCs on one hover of the link, the stream of
messages in a single bearing. In the ring topology, information streams go clockwise and
structure
a
ring
structure.
It
is
likewise
called
an
unbounded
topology.
Fig: Ring Topology
Advantages
Disadvantages
In this topology, each node has the
The failure of a single node in the
opportunity to transmit data. Thus, it is a very network can cause the entire network to fail.
organized network topology.
The configuration makes it easy to
The movement or changes made to
identify faults in network nodes.
network nodes affect the entire network's
performance.
The adding or removing of network
There is heavy dependency on the
nodes is easy, as the process requires wire connecting the network nodes in the
changing only two connections.
ring.
Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)
lOMoARcPSD|19511684
Star Topology:
A star topology is a topology for a Local Area Network (LAN) in which all hubs are separately
associated with a focal association point, similar to a center point or a switch. A star takes more
link than for example a transport, yet the advantage is that if a link flops, just a single hub will be
cut down. All traffic exudes from the center of the star. (Anon, 2019) .The focal site is responsible
for every one of the hubs appended to it. The focal center point is typically a quick, independent
PC and is in charge of directing all traffic to different hubs. The principle focal points of a star
organize is that one breaking down hub does not influence the remainder of the system. Anyway,
this sort of system can be inclined to bottleneck and disappointment issues at the focal site.
A star arrange is regularly joined with a transport topology. The focal center is then associated
with
the
foundation
of
the
transport.
This
combination
is
known
Fig: Star Topology
Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)
as
a
tree.
lOMoARcPSD|19511684
Advantages
Disadvantages
It can be easily expanded without disruption.
Cable failure affects only a single user
It requires more cable to the network.
A central connecting device allows for a single
Easy to troubleshoot and isolate problems
point of failure
More difficult to implement
Mesh Topology:
This is the point-to-direct relationship toward different hubs or gadgets on the system. The whole
system is associated with one another through hubs. Work has (n-1)/2 physical channels for n
gadgets. In the network topology, there are two different ways to exchange information, for
example directing and flooding.
In this topology, the systems are associated legitimately to one another segment, to send
messages, checking the link, they are truly associated with two gadgets. Every one of them has
an individual and separate association in this topology to communicate something specific.
Fig: Mesh Topology
Advantages
Disadvantages
Provides redundant paths between devices
Requires more cable than the other LAN
The network can be expanded without disruption
topologies
Complicated implementation
Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)
lOMoARcPSD|19511684
to current uses
Tree Topology:
A topology that has a root hub and every other hub that are associated with it, assembles a chain
of importance, is known as the topology of the tree. It is otherwise called a various leveled
topology. It contains three dimensions of the pecking order. This is an association of topologies,
for example, a straight transport and a star, incorporating frameworks with a topology of stars
associated with the principle line transport link. This topology is otherwise called the allencompassing star topology.
Fig: Tree Topology
However it has its advantages and disadvantages as weel which is described below.
Advantages
Disadvantages
Fault identification is easy.
Owing to its size and complexity,
maintenance is not easy and costs are high.
Also, configuration is difficult in comparison
to that in other topologies.
The tree topology is useful in cases where a star
or bus cannot be implemented individually.
Though it is scalable, the number of
nodes that can be added depends on the
capacity of the central bus and on the cable
Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)
lOMoARcPSD|19511684
type.
Hybrid Topology:
"The combination of two or more different topologies makes a hybrid topology. When different
topologies are related to each other, they do not reflect the characteristics of any particular
topology. “For example, if one department of the ring topology is worn out, and in another
category the stellar topology is worn in the office, a combination of these two departments will
lead to a hybrid topology (ring topology and stellar topology). This is a scheme that combines a
set of topologies into a large topology.
Fig: Hybrid Topology
Advantages
Disadvantages
Hybrid Network can be planned by the One of the greatest disadvantage of half and
prerequisites of the association and by half topology is its structure. It is difficult to
upgrading the accessible assets. Unique plan this kind of engineering and its an
consideration can be given to hubs where intense activity for fashioners. Setup and
traffic is high just as where odds of blame are establishment process should be extremely
high.
proficient
Its simple to expand the measure of system by The center points used to associate two
including
new
existing design.
parts,
without
irritating unmistakable systems, are over the top
expensive. These centers are not the same as
regular centers as they should be savvy
Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)
lOMoARcPSD|19511684
enough to work with various designs and
ought to be work regardless of whether a
piece of system is down.
Conclusion:
With all these specifications and verifications, I have explained all the topologies with its advantages,
disadvantages including the data rate and their connection.
T4/P3
Discuss the operating principles of networking devices and server types.
Introduction:
In the above task, I have to explain the different operating principles used by network devices
and server types. The network requires certain equipment.
Networking devices:
A computer network is a collection of collective network devices that are well organized to share
data. Network devices are devices necessary for network management, network binding, packet
routing. Communicate with others, share files on the network and much more. The various
network devices and server types are described below:
Server:
This is a computer program that serves the program for another computer program and its user. It
provides data systems on a local area network (LAN) or a wide area network (WAN) filled with
the Internet. For example: a web server, a mail server, a file server, etc. A simple server property
is to visit the port for incoming network requests and a good presentation. Different types of
servers contain their own functions.
Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)
lOMoARcPSD|19511684
Hub:
This is the common point of connection of computer devices on a network that transmits
communication data. It operates in a one-way communication mode and, therefore, has a chance
of collision of data. The hub receives data in the form of an electrical signal in one part, makes
different copies and transfers to all other connected computers. When it receives confirmation
packets, it copies the data, which by its nature, and broadcasts the same data to every other node
on the network. Therefore, the principle of operation is inherently unsafe.
Router:
A router is a tiny electronic device that connects collective computer networks to each other
through wired or wireless connections that examine the contents of data packets being
transmitted on the network or in other networks. It works by downloading the configuration file,
and then configures the network interface. It adds network addresses for each to its routing table.
It has a simple static lack of route to transfer all non-local data to the destination by checking the
required IP address. If he received the correct information, he passes the packets to the correct
route.
Switch:
A device that routes incoming data packets from different ports and forwards them to the desired
location on a local area network (LAN) is called a switch. A switch in the local Ethernet network
addressed from the physical device determines in each frame of the incoming message an output
port for forwarding it to and from. The switches are smarter, but they are similar to
concentrators. A hub is a simple connector that connects all nodes in the network, while the
switch develops an electronic tunnel between the source and the desired port location for
communication without collision.
Multi-Layer Switch:
A network device that can implement the functions of a switch, as well as a router with
outstanding speed that can perform at higher levels of the OSI reference model, is called a
multilevel switch. Multilevel switches use hardware ASICs to perform routing properties. It
works in two efforts between the Routing Processor (RP) and the Switching Mechanism (SE),
Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)
lOMoARcPSD|19511684
because RP receives the packets where the routing is performed and the packet is forwarded to
the desired destination.
Firewall:
A network security system designed to secure a private network is called a firewall. It can be
performed as hardware and software, and a combination of both. It blocks unauthorized access
and is often formed to prohibit accessible Internet users from accessing private networks
connected to the Internet. This prevents malicious attacks on our computers.
HIDS (Host-Based Intrusion Detection System):
The host-based intrusion detection system is a tracking system that monitors the computer
system on which it is configured to monitor misuse and return by registering activity and
notifying about controlled management of privileges. Some anti-virus programs, such as firewall,
antivirus software and spyware detection, are some of the programs installed in HIDS. He finds
in a single hosting system a view and reporting of the system's structure and application activity,
the preservation of which ensures that everything that passes through the firewall does not leave
vulnerable.
Repeater:
This is an electronic network device that relays the received signal with a higher bandwidth and a
prolonged network barrier than what can be with the original signal. It is connected to the
network line of the device used in two network nodes between two-way operations for the
transmission of physical signals. For the same two types of network connection, the main goal is
to extend the network transmission distance from the data signal for sending or forwarding.
Bridges:
It is a type of computer network device that prepares the connection of one Ethernet to another
Ethernet, which carries the same protocol. It operates at the data link layer of the OSI model,
combining two different types of networks and communicating between them. It is identical to
Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)
lOMoARcPSD|19511684
concentrators and repeaters, ie, it publishes data to each node. Although it stores the MAC
address by filtering the source and destination.
Wireless networking devices:
Wireless networks are computer networks in which electromagnetic waves transmit a signal over
a communication channel that are not connected by cables of any type that are performed by
wireless network devices.
Access point:
An access point is a station on a local area network (LAN) that provides wireless devices and
wired networks for linking transmitted and received data. It provides communication between
the WLAN and the supported wired network and connects users to other users on the network.
The principle of the AP s is for broadcasting a wireless signal that a computer can detect, with
which it can communicate with the network without using any wires.
Content filter:
A content filter is a software or hardware solution that involves preventing access to certain
things, which can be harmful when accessed through the program. It is also known as
information filtering. It works by matching character strings if the agreed content is not allowed
through it.
Load balancer:
A load balancer efficiently manages traffic from side to side without using complex routing
protocols such as the Border Gateway Protocol (BGP). It is also known as a server farm or server
pool. This is an economical solution for Internet applications by increasing availability and
scalability. It effectively distributes the load to the client network on multiple servers.
Modem:
It is a device or program that provides a computer for transferring data and files over a telephone
or cable line. The term "modem" is combined with modulation and demodulation, since it
Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)
lOMoARcPSD|19511684
performs and modulates and demodulates analog carrier signals to encode and decode digital
information for conversion. It helps to send and receive digital information between personal
computers.
Packet shaper:
The formation of a packet is also popular as a form of traffic, which is a system for managing the
re-support of network files or data transmission to meet a certain level of performance, quality of
service. It is used to classify incoming and outgoing traffic that passes through it, and determines
the priority of this traffic based on the rules that we define.
VPN concentrator:
The VPN hub is an advanced router that was created to provide secure VPN connections and
send messages between VPN hosts. It has the properties to develop and monitor the huge load of
VPN tunnels. It helps to store hundreds of thousands of remote clients through remote encrypted
VPN tunnels from anywhere. It is used to create VPN connections between sites.
Server types:
A computer program that provides various services to other computer programs (and its users) is
a server. Whenever computers share resources with client machines, they are considered servers,
because they are unlikely to perform any other tasks than their server tasks. He is responsible for
managing network resources. Dedicated server has high-performance memory, faster processor.
Different types of servers and their operating principles:
Web server:
A program that needs a hypertext transfer protocol (HTTP) to provide content or services to end
users via the Internet is called a web server. Basically, a web server consisting of a physical
server, a server operating system (OS) and software, must provide an HTTP connection. It is also
known as an Internet server. The web server is responsible for hosting the website files.
File server:
A file server is a server that facilitates the approach to files that act as a central file store so that
other computers can access files on the same network. It provides the user with the ability to
Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)
lOMoARcPSD|19511684
transfer information over the network without physically transferring files to another external
storage device. Typically, an FTP server (File Transfer Protocol) is used when transferring files.
Database server:
The database server refers to the software and hardware used to start the database. It is identical
to the data store where the website stores or stores its data and information. In the database, the
network client sends SOL requests (a structured query) to the database server, after which the
result query is returned over the network.
Virtualization:
This refers to creating a virtual resource, such as a server, desktop, operating system, file,
storage, or network. This is a storage device or network resources. Its feature is the controlled
workload by transferring traditional calculations to make it more scalable. Since it does not
require the installation of hardware components, it is a cheaper system for implementation. This
reduces the load. This allows you to quickly deploy resources. It offers the best uptime.
Print server:
It is a software application, a networked computer that can create print-related tasks on a network
of computers. They are worn in both large corporate and small office networks. They are
interconnected with a computer network to meet the need for printing jobs that contain more than
one printer on the network.
Conclusion:
Thus, in this task I discussed the principles of operation of the mentioned network devices and
server types. Different network devices and the server perform various jobs in accordance with
their services.
Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)
lOMoARcPSD|19511684
T5/P4
Discuss the inter dependence of workstation hardware with relevant networking software.
Introduction:
In this task I will talk about the interdependence of the workstation's hardware with the
corresponding network software. The computer system consists of two main elements: hardware
and software. In order for any computer system to function smoothly, a vital role is played by
both hardware and software components. If the necessary hardware and software are not
available, the system does not work correctly. Typically, hardware is a collection of physical
elements that you can touch, which are also known as computer hardware. Similarly, the
software is a program consisting of a set of instructions for the computer to perform certain
operations. They are in many ways interdependent with each other.
In order for a computer to work efficiently, manipulate data, and produce a useful conclusion. It
is necessary that the hardware and software work together. Computer software controls computer
equipment. These two components complement each other and cannot act independently of each
other. Without software, computer equipment is useless. Similarly, computer software cannot be
used without hardware support. Therefore, hardware and software components must interact with
each other to make the system on the network.
Work Stations Of Hardware
Needed Requirement of the hardware for networking
Processor
Inter Core i5-64 bit 830GHZ or AMD FX 4100 and above
Motherboard
Dual processor.Intel SE7501BR2 server kit
RAM/Memory Requirement
4 GB DDR 3
Display
Super VGA(1024*768)
Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)
lOMoARcPSD|19511684
Router
Wired or wireless according to the network
Hard disk
1.5 TB
Printer
Ink jet or dot matrix(According to workload)
Switches
Manageable and unmanageable
Bandwith
150mb per second
Acess pointer
Wireless
FireWall
Juniper
Network Interface Card
100BaseT
Hardware required in a workstation:
Software requirements:
Software is a simple term for various kinds of programs used to work with computers and
computers. The need for software is required to run any devices. Because the hardware executes
software commands, it is impossible to perform hardware in the absence of software. Terms that
can be used to describe software are scripts, programs, a set of instructions and applications.
There are many network programs that have their own function and specialty. The use of various
types of software that is carried for the network between any two systems is client software,
server software, etc.
Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)
lOMoARcPSD|19511684
To execute the process, the client needs a server. The client connects to the services through the
network server. Switches and routers are needed to support the network. Client software refers to
the software that acts as a link between client and server computers. An OS that can run on only
one computer is called a client operating system that is used by individual users.
Server software is usually designed to connect to the server hardware, as well as to the processor,
memory, memory and other communication ports. Different types of servers are a web server, an
application server, a file server, etc. However, the server software also needed to install some
operating system for the proper functioning of the functions. The OS that was created to install
and warn the server is called a server operating system. The firewall is installed on separate
servers to manage incoming and outgoing signals.
Inter dependency of workstation hardware with software:
Hardware and software, they are both very interdependent with each other. To output the
computer, they must work together. Without hardware support, the software cannot be used, and
if there is no correct indication of the hardware provided, it is useless. To perform the work, a
suitable software package must be installed in the hardware. As various software, various tasks
can be performed in the hardware. Hardware and software are like the body and soul of a
computer system. The software acts as a connection between the user and, consequently, the
hardware. Therefore, it is necessary that both of them are connected to each other to run any
systems.
Conclusion:
Hence, I discussed the hardware requirements, the servers with the appropriate software, their
interdependence and how they perform their work. Hardware with the perfect software will help
you to manage all organizations smoothly and efficiently.
Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)
lOMoARcPSD|19511684
T8/P5
Design a networked system to meet a given specification.
Introduction:
In this task, I'm going to talk about the network system that is prepared by the Visio tool. A
server is a type of network that has organized network resources for other computer programs
(and its users). Separation of functions into two or several different parts of the application is
known as server technology.
Fig: NBL Network System.
The following figure shows the use of various types of Visio tools used to create a network
system. It contains various departments, such as a server station, workstations and substations.
Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)
lOMoARcPSD|19511684
There are 2 workstations - workstation 1 and workstation 2. There are two server server naming
stations and a server station 2. It has different IP addresses provided to different stations. In this
case, IP is assigned dynamically.
HEAD OFFICE KATHMANDU
Name
Of IP Assigned
Server
Relay Server
DHCP
IMS with DNS
RODC
File Server
Print Server
192.168.100.1
192.168.100.3
200.200.100.1
192.168.100.2
192.168.100.77
192.168.100.10
Subnet Mask
Prefix Length
Gateway
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
26
26
26
26
26
26
192.168.100.1
192.168.100.1
192.168.100.1
192.168.100.1
192.168.100.1
192.168.100.1
NEW BANESHWOR BRANCH
Name
Of IP Assigned
Server
CDC
RODC
Print Server
DHCP Server
192.168.100.88
192.168.100.44
192.168.100.10
192.168.100.3
Subnet Mask
Prefix Length
Gateway
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
26
26
26
26
192.168.100.2
192.168.100.2
192.168.100.2
192.168.100.2
Server that I have used:
DHCP: This is the network management protocol used to dynamically assign an IP address on
any device or node on the network so that they can communicate using IP. DHCP automates and
centrally manages these configurations, and does not require that network administrators
manually assign IP addresses to all network devices.
DC: This means the domain controller. This is the server that leads to the desire for a security
conformation in the Windows server domain. It supports the approach to a set of network
resources for a group of users. In order for a domain to access sources, the user only needs to log
on to the system.
Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)
lOMoARcPSD|19511684
CDC: It is intended for the controller of the child domain. A child domain is another domain that
falls under the parent domain in the active directory domain in the hierarchy. This is similar to
the first root of a tree used for the boundaries of securities, with low network traffic and an
administrative overhead.
RODC: It is only for a read-only domain controller. This allows us to save the active directory
(AD). It is mainly used in a branch office that cannot support its own domain controllers. It
provides functions such as safer settings for remote locations, such as a branch, RODC
administrator, etc.
Explanation of network devices: The network devices are:
Router: A router is a tiny electronic device that connects collective computer networks to each
other through wired or wireless connections that examine the contents of data packets being
transmitted on the network or in other networks.
Switch: A device that routes incoming data packets from different ports and forwards them to the
desired location on a local area network (LAN) is called a switch. A switch in the local Ethernet
network addressed from the physical device determines in each frame of the incoming message
an output port for forwarding it to and from. The switches are smarter, but they are similar to
concentrators.
Printer: The printer is an output device that receives and displays images from computers and
transfers this input to paper or prints paper documents. Electronic data is sent from computers to
printers to print a document.
Access point: An access point is a station on a local area network (LAN) that provides wireless
devices and wired networks for linking transmitted and received data. It provides communication
between the WLAN and the supported wired network and connects users to other users on the
network.
Firewall: A network security system designed to secure a private network is called a firewall. It
can be performed as hardware and software, and a combination of both.
Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)
lOMoARcPSD|19511684
Explanation of network Components:
Users: An authority that has control over the use of the application and its objects.
Groups: Collections of users with equal permissions.
Organizational unit: A container for storing users, groups and computers is called an
organizational unit.
Membership: Membership granted to other clients by the domain controller.
Group policy: It implements configurations for users and computers.
Conclusion:
So, using the Visio tool, I built this network project as shown in the above figure, which looks at
the various server technologies that are connected across different network devices and various
components.
Task 9[P6]
Test and evaluate the design to meet the requirements and analyze user feedback.
Introduction:
The design that must meet the requirements to analyze user feedback is described here in this
task.
The process of finding, analyzing and investigating any service, to complete, to find out whether
it works properly or not, is called testing. This helps to find out what error it is. Here we are
going to prepare a test log of what we tested, and what the expected result of this test magazine
is.
So the test log may be:
S.N What
was Expected Output
Actual Output
Remarks
tested
Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)
lOMoARcPSD|19511684
1.
DHCP
The DHCP server must Since the DHCP scope Customer
server
be able to automatically is between 2 and 50, requirements for the
assign IP addresses to the DHCP server can corresponding
40 client computers.
2.
provide up to 44 IP address
IP
were
Domain
addresses.
Computers must be able Customers
Controller
to
(DC)
membership in the same of the primary server.
because
network.
get a membership.
Print server
3.
connect
required.
received Requirements
to the membership view been fully satisfied,
Custom computers must Customers
be
able
to
have
share
have The
customers
requirements
a access to a shared have been fully met,
printer.
printer.
as clients gain access
to the printer
Web server
4.
VPN server
5.
On the client computer, Web pages were seen The
requirements
the web page on the on the main server.
were fully met, as the
primary server should
web page was seen on
be displayed using the
the server.
primary site.
The client computer can The client computer The
assign
connection.
a
requirements
VPN was able to assign were fully met.
VPN connections
Evaluation of the design:
Network design for communication between Nepal Bank Limited and its affiliate was
triumphantly designed, and a test log was executed where the organization's requirements were
met. Evaluation of design is also another important part to consider why it is suitable. Therefore,
some of the reasons are mentioned below that the network I built is suitable for organizations.
Reliability:
Reliability is the function of any computer component, such as hardware or network, or software
that regularly executes in accordance with requirements. It refers to the type of application,
Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)
lOMoARcPSD|19511684
delivering packets from the source to the desired source. Not only the level of communication,
but also the components of network communication devices, such as a firewall, routers, a switch,
etc., must also be reliable. Reliability also means compatibility, which indicates whether the
created network is compatible or not. Since I created a network for Nepal-Bank, taking into
account all the requirements and requirements of the organization.
Bandwidth:
Bandwidth is defined as a range in the frequency range or wavelength range. Bandwidth is also
defined as the amount of data that can be transmitted over a certain period of time. It determined
the speed of data transfer in any network. This does not limit the speed of the Internet. In my
network design, I used sufficient bandwidth to simultaneously transmit and receive more data.
Scalability:
Scalability is a function that explains the ability of a process, network, software or organization
to support increased demand. It's very easy to apply. When the network is built, we want it to
work for a long time and do not need to change it again. Scaling the network means creating a
network design for the present and the future, and both. We do not need to redesign the whole
project in time, only small changes can be made at the request of the organization, if the scaling
was done at the beginning. In my project, I also scaled the network to consider the changes that
might arise in the future, and to adapt the possibilities of future preferences.
Feedback from the end user:
Independent feedback
Project name: Nepal Bank Networked system
Feedback Given By: Priti Yadav
Pr
Signature:
Date:
Project Description: The project was built to establish a connection between the head office
located in Kathmandu and the branches of Nepal Bank Limited. This was possible only on
different servers as a DHCP server, a DC server, a RODC server, a CDC server, a VPN server,
etc.
Important features of the project:
Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)
lOMoARcPSD|19511684
Communication takes place in private networks, and in this network system a virtual network of
the main office and a branch of using VPN are implemented. It also has a character like a
domain-based network system, since it helps all the other computer to become a member of the
core server and easily approach files and the required data.
Checklists
Yes
No Comment
Have recognized objects and data structures required to the system?
Does the prepared design meets the requirement of client
Is security was good enough?
Does network system contain scalability i.e. suitable for further use in
future?
Is the networked system flexible?
Is it easy to operate?
Is it reliable?
Project Limitation
Despite its various advantages, it does not have a secondary DNS.
This is a small unpleasant difference or error when preparing a
network design. However, this can be fixed.
Feedback Evaluation
Feedback Evaluated Signature:
By: Razan Yadav
Date:
Evaluation of the system: The overall assessment of the system determines that the result is
good, while some restrictions also come, which can soon be met as soon as possible.
Recommendations for future consideration: The key factors that determine the network
system are scalability, which can be changed to meet the requirements of the organization. The
prepared network system should be timely updated, updated and analyzed by time to increase
it in the future.
Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)
lOMoARcPSD|19511684
Conclusion:
Hence, I have provided a test log for different servers that were worn in the network design, as
well as the expected output and actual output. I also correctly assessed various factors to meet
the requirements of network systems and user feedback on network design.
References And Citation
Revolvy,
L.
(2019). "Network
topology"
on
Revolvy.com.
[online]
Revolvy.com.
Available
at:
https://www.revolvy.com/topic/Network%20topology [Accessed 11 Apr. 2019].
Networkskyx.com. (2019). Network SkyX. [online] Available at: http://www.networkskyx.com/ [Accessed
11 Apr. 2019].
Anon, (2019). [online] Available at: http://www.academia.edu/12384294/computer_dictionari
[Accessed 11 Apr. 2019].
Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)
Download