lOMoARcPSD|19511684 Network 1sm Networking Principles (Leeds Beckett University) Studocu is not sponsored or endorsed by any college or university Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Task 1 P1: Discuss the benefits and constraints of different network types and standards. Introduction: It is all about the explanation of the various types and standards of the network as well as their advantages and limitations in this task. A network is a collection of connected computers, servers, mainframes, network devices, peripherals, or other devices to allow data sharing. On the network there are different types of systems: peer-to-peer, client-server, cloud, cluster, centralized, virtualization, etc., and OSI model, TCP/IP model, standards such as IEEE, 802.x are different types of network standards.[CITATION Com \l 1033 ] Peer Based: A peer-to-peer network is the assembly of computers, each of which acts as nodes for file sharing in a group. In this, each computer acts as a server for storing files in it. He does not have a central computer or a dedicated server. Benefits of the peer based network: There is no need to buy an expensive server. A network manager is not required, since each user controls their own computers. No technical knowledge is required. In the client-server there is less chance of network traffic. Constraints of peer based network: Each computer must run more than one role, so you can print or share files that increase the load. The organization of data storage does not exist, since the data can be stored on any computer connected to the same network. Each computer needs its own backup. Client server: Each computer must have more than one role, so you can print or share files that increase the load. The organization of data storage does not exist, since the data can be stored on any computer connected to the same network. Each computer needs its own backup. Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Benefits of the client server: Data and other resources can be updated. New clients or server can be added at any time. He can easily service. Constraints of the client server: A huge number of clients send requests to the same server at the same time, which can cause problems. It does not have the reliability of the network. The client may not have the resources that existed on the server Cloud: A cloud is an unpredictable part of a network through which one or more network resources are searched or implemented. This requires the exchange of some or all of the network operations to the cloud computing network. (Networkskyx.com, 2019) Benefits of the cloud networking: The most significant advantage is reducing IT costs. It is much more reliable and consistent on the service management platform. It provides maintenance capabilities through centralized administration of resources Constraints of the cloud networking: There are many times when this system can have some sincere malfunction at a time when data can be picked up anywhere at any time. It can transfer confidential company information to a third party (a cloud service provider). Cluster: A server group that behaves as one system and has a high enable ability that is connected through a LAN is called a cluster. This is the logical unit for storing files and data on the hard disk, which is organized by the operating system of the computer (operating system). Benefits of the cluster networking: This reduced the single point of failure due to the functionality of switching the virtual Exchange server. With limited downtime, it has a high ability to perform maintenance and upgrades. Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Constraints of the cluster networking: It shares storage errors. It also does not serve network services. It shows the error in working order. Otherwise, an unnecessary geographically distributed solution for clustering was implemented as a result of disaster sites. Centralization: This is the type of computational architecture on the central server on which all or most of the calculations are performed, which is the acting agent for all communications. Benefits of the centralization: This helps reduce costs, because more equipment and machines are not supported. Improved data security. It consists of processing in centralized processing systems. Constraints of the centralization: The data are independent of each other for other information systems. Huge data storage is necessary in the central information system, which will help to reduce local accountability. Transactions are very expensive to transfer. Virtualization: It describes the formation of a virtual resource, such as a computer / desktop, operating system (OS), server, network or file. This is a storage device or network resources. Its main goal is to make it more scalable by managing workloads by converting traditional computing. Benefits of the virtualization: This makes the reformation very fast and accurate, with limited frames and equipment share - all this is virtually. He performed more efficient IT operations. Constraints of the virtualization: Since it does not require the installation of hardware components, it is a cheaper system for implementation. This reduces the load. This allows you to quickly deploy resources. It offers the best uptime. OSI model: This is a related model for how the application connects over the network through systems that are open to connect and communicate with other systems. This is the conceptual basis for Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 understanding relationships, therefore it is divided into seven components or layers, each of which has different types of services that should be provided to the layers above and below. Layers and components: Physical layer Data link layer Network layer Transport layer Session layer Presentation layer Application layer Benefits of the OSI model: It is considered a standard model in computer networks. It provides a wide range selection. It does not lie on a particular computer system that must be executed. For security reasons, the data is encrypted. In this OSI model, just add a few network models. Constraints of the OSI model: Data integrity is not required in many applications that are supported by the OSI model. OSI needs to be understood between the three parties that are users and the service provider, for a quicker setup. It is difficult to understand, because it is a complex model. TCP/IP model: This means the transmission control protocol / internet protocol. This is the language in which Computer \ PC users come to the Internet, which can be worn as a communication protocol on a private network. It works under four layers. They are: Application layer Transport layer Internet layer Network Access layer Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Benefits of the TCP/IP: This means the transmission control protocol / internet protocol. This is the language in which Computer \ PC users come to the Internet, which can be worn as a communication protocol on a private network. It works under four layers. Constraints of the TCP/IP: It is difficult to organize and maintain. IPX is much faster than the TCP / IP model. Small TCP / IP is higher than IPX. Conclusions: Consequently, I have discussed different types of systems such as peer - to - peer, client - server, cloud, cluster, etc., as well as network standards such as OSI model, TCP / IP model, etc., and their benefits and constraints. T2/P2 Explain the impact of network topology, Communication and bandwidth requirements. Introduction: The impact of network topology, Communication and bandwidth requirements have been described here. A network topology is a schematic definition in which the network location along the connection lines, including and attached to different nodes (the sender and the receiver). Network topology is the interconnected example of system components (Revolvy, 2019). The volume of data that can be transferred across a network at a given time is called its bandwidth. An expensive, high bandwidth network is able to transfer data much quicker than a low bandwidth one. The bandwidth is effected by the types of network cards and modems used as well as the amount and type of cable used. A Network topology might be physical, mapping equipment setup, or coherent, mapping the way that the information must take so as to go around the system. Physical topology refers to the physical design of the network, while logical topology refers to how data is handled within the network regardless of its physical topology. There are six topologies of the Physical Topology : bus topology, star topology, ring topology, topology of the grid, topology of the tree, and topology of the hybrid. In the context of a computer network these are different topologies. There are many distinguished topologies yet they are not exacting, which implies that any of them can be joined. Be that as it may, every topology has an alternate standard and may utilize distinctive equipment techniques so they are not exchangeable. Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 BUS Topology: A bus topology is a topology for a Local Area Network (LAN) in which every one of the hubs are associated with a solitary link. The link to which the hubs interface is known as a "spine". On the off chance that the spine is broken, the whole section falls flat. Bus topologies are generally simple to introduce and don't require much cabling contrasted with the options. In this topology organize messages are sent to every terminal on the system - so on the off chance that one of the terminals breaks, at that point the others are not influenced. In the event that you need to communicate something specific from PC A to PC B then every one of the PCs will get the message, anyway in light of the fact that you have included PC B's location, just PC B will lift it up and show it. Like the ring topology there is no extraordinary PC on this system. It is famous in light of the fact that it is a straightforward just as a generally shabby and dependable topology. Fig: Bus Topology The advantages and disadvantages of bus topology is described here. Advantages Disadvantages It is cheap and easy to implement. when computers are added or removed networks Less cable is required. get disrupted. A break in the cable will prevent all systems from It does not use any specialized network accessing the network. It is difficult to troubleshoot. equipment. RING Topology Every PC is associated with another PC that shapes a ring structure, with the last PC associated with the principal PC. For every gadget there are actually two neighbors. In view of the Token Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Ring Mechanics, every PC is associated with a ring structure that exchanges what originates from the past PC in the line. While interfacing PCs on one hover of the link, the stream of messages in a single bearing. In the ring topology, information streams go clockwise and structure a ring structure. It is likewise called an unbounded topology. Fig: Ring Topology Advantages Disadvantages In this topology, each node has the The failure of a single node in the opportunity to transmit data. Thus, it is a very network can cause the entire network to fail. organized network topology. The configuration makes it easy to The movement or changes made to identify faults in network nodes. network nodes affect the entire network's performance. The adding or removing of network There is heavy dependency on the nodes is easy, as the process requires wire connecting the network nodes in the changing only two connections. ring. Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Star Topology: A star topology is a topology for a Local Area Network (LAN) in which all hubs are separately associated with a focal association point, similar to a center point or a switch. A star takes more link than for example a transport, yet the advantage is that if a link flops, just a single hub will be cut down. All traffic exudes from the center of the star. (Anon, 2019) .The focal site is responsible for every one of the hubs appended to it. The focal center point is typically a quick, independent PC and is in charge of directing all traffic to different hubs. The principle focal points of a star organize is that one breaking down hub does not influence the remainder of the system. Anyway, this sort of system can be inclined to bottleneck and disappointment issues at the focal site. A star arrange is regularly joined with a transport topology. The focal center is then associated with the foundation of the transport. This combination is known Fig: Star Topology Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) as a tree. lOMoARcPSD|19511684 Advantages Disadvantages It can be easily expanded without disruption. Cable failure affects only a single user It requires more cable to the network. A central connecting device allows for a single Easy to troubleshoot and isolate problems point of failure More difficult to implement Mesh Topology: This is the point-to-direct relationship toward different hubs or gadgets on the system. The whole system is associated with one another through hubs. Work has (n-1)/2 physical channels for n gadgets. In the network topology, there are two different ways to exchange information, for example directing and flooding. In this topology, the systems are associated legitimately to one another segment, to send messages, checking the link, they are truly associated with two gadgets. Every one of them has an individual and separate association in this topology to communicate something specific. Fig: Mesh Topology Advantages Disadvantages Provides redundant paths between devices Requires more cable than the other LAN The network can be expanded without disruption topologies Complicated implementation Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 to current uses Tree Topology: A topology that has a root hub and every other hub that are associated with it, assembles a chain of importance, is known as the topology of the tree. It is otherwise called a various leveled topology. It contains three dimensions of the pecking order. This is an association of topologies, for example, a straight transport and a star, incorporating frameworks with a topology of stars associated with the principle line transport link. This topology is otherwise called the allencompassing star topology. Fig: Tree Topology However it has its advantages and disadvantages as weel which is described below. Advantages Disadvantages Fault identification is easy. Owing to its size and complexity, maintenance is not easy and costs are high. Also, configuration is difficult in comparison to that in other topologies. The tree topology is useful in cases where a star or bus cannot be implemented individually. Though it is scalable, the number of nodes that can be added depends on the capacity of the central bus and on the cable Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 type. Hybrid Topology: "The combination of two or more different topologies makes a hybrid topology. When different topologies are related to each other, they do not reflect the characteristics of any particular topology. “For example, if one department of the ring topology is worn out, and in another category the stellar topology is worn in the office, a combination of these two departments will lead to a hybrid topology (ring topology and stellar topology). This is a scheme that combines a set of topologies into a large topology. Fig: Hybrid Topology Advantages Disadvantages Hybrid Network can be planned by the One of the greatest disadvantage of half and prerequisites of the association and by half topology is its structure. It is difficult to upgrading the accessible assets. Unique plan this kind of engineering and its an consideration can be given to hubs where intense activity for fashioners. Setup and traffic is high just as where odds of blame are establishment process should be extremely high. proficient Its simple to expand the measure of system by The center points used to associate two including new existing design. parts, without irritating unmistakable systems, are over the top expensive. These centers are not the same as regular centers as they should be savvy Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 enough to work with various designs and ought to be work regardless of whether a piece of system is down. Conclusion: With all these specifications and verifications, I have explained all the topologies with its advantages, disadvantages including the data rate and their connection. T4/P3 Discuss the operating principles of networking devices and server types. Introduction: In the above task, I have to explain the different operating principles used by network devices and server types. The network requires certain equipment. Networking devices: A computer network is a collection of collective network devices that are well organized to share data. Network devices are devices necessary for network management, network binding, packet routing. Communicate with others, share files on the network and much more. The various network devices and server types are described below: Server: This is a computer program that serves the program for another computer program and its user. It provides data systems on a local area network (LAN) or a wide area network (WAN) filled with the Internet. For example: a web server, a mail server, a file server, etc. A simple server property is to visit the port for incoming network requests and a good presentation. Different types of servers contain their own functions. Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Hub: This is the common point of connection of computer devices on a network that transmits communication data. It operates in a one-way communication mode and, therefore, has a chance of collision of data. The hub receives data in the form of an electrical signal in one part, makes different copies and transfers to all other connected computers. When it receives confirmation packets, it copies the data, which by its nature, and broadcasts the same data to every other node on the network. Therefore, the principle of operation is inherently unsafe. Router: A router is a tiny electronic device that connects collective computer networks to each other through wired or wireless connections that examine the contents of data packets being transmitted on the network or in other networks. It works by downloading the configuration file, and then configures the network interface. It adds network addresses for each to its routing table. It has a simple static lack of route to transfer all non-local data to the destination by checking the required IP address. If he received the correct information, he passes the packets to the correct route. Switch: A device that routes incoming data packets from different ports and forwards them to the desired location on a local area network (LAN) is called a switch. A switch in the local Ethernet network addressed from the physical device determines in each frame of the incoming message an output port for forwarding it to and from. The switches are smarter, but they are similar to concentrators. A hub is a simple connector that connects all nodes in the network, while the switch develops an electronic tunnel between the source and the desired port location for communication without collision. Multi-Layer Switch: A network device that can implement the functions of a switch, as well as a router with outstanding speed that can perform at higher levels of the OSI reference model, is called a multilevel switch. Multilevel switches use hardware ASICs to perform routing properties. It works in two efforts between the Routing Processor (RP) and the Switching Mechanism (SE), Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 because RP receives the packets where the routing is performed and the packet is forwarded to the desired destination. Firewall: A network security system designed to secure a private network is called a firewall. It can be performed as hardware and software, and a combination of both. It blocks unauthorized access and is often formed to prohibit accessible Internet users from accessing private networks connected to the Internet. This prevents malicious attacks on our computers. HIDS (Host-Based Intrusion Detection System): The host-based intrusion detection system is a tracking system that monitors the computer system on which it is configured to monitor misuse and return by registering activity and notifying about controlled management of privileges. Some anti-virus programs, such as firewall, antivirus software and spyware detection, are some of the programs installed in HIDS. He finds in a single hosting system a view and reporting of the system's structure and application activity, the preservation of which ensures that everything that passes through the firewall does not leave vulnerable. Repeater: This is an electronic network device that relays the received signal with a higher bandwidth and a prolonged network barrier than what can be with the original signal. It is connected to the network line of the device used in two network nodes between two-way operations for the transmission of physical signals. For the same two types of network connection, the main goal is to extend the network transmission distance from the data signal for sending or forwarding. Bridges: It is a type of computer network device that prepares the connection of one Ethernet to another Ethernet, which carries the same protocol. It operates at the data link layer of the OSI model, combining two different types of networks and communicating between them. It is identical to Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 concentrators and repeaters, ie, it publishes data to each node. Although it stores the MAC address by filtering the source and destination. Wireless networking devices: Wireless networks are computer networks in which electromagnetic waves transmit a signal over a communication channel that are not connected by cables of any type that are performed by wireless network devices. Access point: An access point is a station on a local area network (LAN) that provides wireless devices and wired networks for linking transmitted and received data. It provides communication between the WLAN and the supported wired network and connects users to other users on the network. The principle of the AP s is for broadcasting a wireless signal that a computer can detect, with which it can communicate with the network without using any wires. Content filter: A content filter is a software or hardware solution that involves preventing access to certain things, which can be harmful when accessed through the program. It is also known as information filtering. It works by matching character strings if the agreed content is not allowed through it. Load balancer: A load balancer efficiently manages traffic from side to side without using complex routing protocols such as the Border Gateway Protocol (BGP). It is also known as a server farm or server pool. This is an economical solution for Internet applications by increasing availability and scalability. It effectively distributes the load to the client network on multiple servers. Modem: It is a device or program that provides a computer for transferring data and files over a telephone or cable line. The term "modem" is combined with modulation and demodulation, since it Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 performs and modulates and demodulates analog carrier signals to encode and decode digital information for conversion. It helps to send and receive digital information between personal computers. Packet shaper: The formation of a packet is also popular as a form of traffic, which is a system for managing the re-support of network files or data transmission to meet a certain level of performance, quality of service. It is used to classify incoming and outgoing traffic that passes through it, and determines the priority of this traffic based on the rules that we define. VPN concentrator: The VPN hub is an advanced router that was created to provide secure VPN connections and send messages between VPN hosts. It has the properties to develop and monitor the huge load of VPN tunnels. It helps to store hundreds of thousands of remote clients through remote encrypted VPN tunnels from anywhere. It is used to create VPN connections between sites. Server types: A computer program that provides various services to other computer programs (and its users) is a server. Whenever computers share resources with client machines, they are considered servers, because they are unlikely to perform any other tasks than their server tasks. He is responsible for managing network resources. Dedicated server has high-performance memory, faster processor. Different types of servers and their operating principles: Web server: A program that needs a hypertext transfer protocol (HTTP) to provide content or services to end users via the Internet is called a web server. Basically, a web server consisting of a physical server, a server operating system (OS) and software, must provide an HTTP connection. It is also known as an Internet server. The web server is responsible for hosting the website files. File server: A file server is a server that facilitates the approach to files that act as a central file store so that other computers can access files on the same network. It provides the user with the ability to Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 transfer information over the network without physically transferring files to another external storage device. Typically, an FTP server (File Transfer Protocol) is used when transferring files. Database server: The database server refers to the software and hardware used to start the database. It is identical to the data store where the website stores or stores its data and information. In the database, the network client sends SOL requests (a structured query) to the database server, after which the result query is returned over the network. Virtualization: This refers to creating a virtual resource, such as a server, desktop, operating system, file, storage, or network. This is a storage device or network resources. Its feature is the controlled workload by transferring traditional calculations to make it more scalable. Since it does not require the installation of hardware components, it is a cheaper system for implementation. This reduces the load. This allows you to quickly deploy resources. It offers the best uptime. Print server: It is a software application, a networked computer that can create print-related tasks on a network of computers. They are worn in both large corporate and small office networks. They are interconnected with a computer network to meet the need for printing jobs that contain more than one printer on the network. Conclusion: Thus, in this task I discussed the principles of operation of the mentioned network devices and server types. Different network devices and the server perform various jobs in accordance with their services. Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 T5/P4 Discuss the inter dependence of workstation hardware with relevant networking software. Introduction: In this task I will talk about the interdependence of the workstation's hardware with the corresponding network software. The computer system consists of two main elements: hardware and software. In order for any computer system to function smoothly, a vital role is played by both hardware and software components. If the necessary hardware and software are not available, the system does not work correctly. Typically, hardware is a collection of physical elements that you can touch, which are also known as computer hardware. Similarly, the software is a program consisting of a set of instructions for the computer to perform certain operations. They are in many ways interdependent with each other. In order for a computer to work efficiently, manipulate data, and produce a useful conclusion. It is necessary that the hardware and software work together. Computer software controls computer equipment. These two components complement each other and cannot act independently of each other. Without software, computer equipment is useless. Similarly, computer software cannot be used without hardware support. Therefore, hardware and software components must interact with each other to make the system on the network. Work Stations Of Hardware Needed Requirement of the hardware for networking Processor Inter Core i5-64 bit 830GHZ or AMD FX 4100 and above Motherboard Dual processor.Intel SE7501BR2 server kit RAM/Memory Requirement 4 GB DDR 3 Display Super VGA(1024*768) Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Router Wired or wireless according to the network Hard disk 1.5 TB Printer Ink jet or dot matrix(According to workload) Switches Manageable and unmanageable Bandwith 150mb per second Acess pointer Wireless FireWall Juniper Network Interface Card 100BaseT Hardware required in a workstation: Software requirements: Software is a simple term for various kinds of programs used to work with computers and computers. The need for software is required to run any devices. Because the hardware executes software commands, it is impossible to perform hardware in the absence of software. Terms that can be used to describe software are scripts, programs, a set of instructions and applications. There are many network programs that have their own function and specialty. The use of various types of software that is carried for the network between any two systems is client software, server software, etc. Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 To execute the process, the client needs a server. The client connects to the services through the network server. Switches and routers are needed to support the network. Client software refers to the software that acts as a link between client and server computers. An OS that can run on only one computer is called a client operating system that is used by individual users. Server software is usually designed to connect to the server hardware, as well as to the processor, memory, memory and other communication ports. Different types of servers are a web server, an application server, a file server, etc. However, the server software also needed to install some operating system for the proper functioning of the functions. The OS that was created to install and warn the server is called a server operating system. The firewall is installed on separate servers to manage incoming and outgoing signals. Inter dependency of workstation hardware with software: Hardware and software, they are both very interdependent with each other. To output the computer, they must work together. Without hardware support, the software cannot be used, and if there is no correct indication of the hardware provided, it is useless. To perform the work, a suitable software package must be installed in the hardware. As various software, various tasks can be performed in the hardware. Hardware and software are like the body and soul of a computer system. The software acts as a connection between the user and, consequently, the hardware. Therefore, it is necessary that both of them are connected to each other to run any systems. Conclusion: Hence, I discussed the hardware requirements, the servers with the appropriate software, their interdependence and how they perform their work. Hardware with the perfect software will help you to manage all organizations smoothly and efficiently. Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 T8/P5 Design a networked system to meet a given specification. Introduction: In this task, I'm going to talk about the network system that is prepared by the Visio tool. A server is a type of network that has organized network resources for other computer programs (and its users). Separation of functions into two or several different parts of the application is known as server technology. Fig: NBL Network System. The following figure shows the use of various types of Visio tools used to create a network system. It contains various departments, such as a server station, workstations and substations. Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 There are 2 workstations - workstation 1 and workstation 2. There are two server server naming stations and a server station 2. It has different IP addresses provided to different stations. In this case, IP is assigned dynamically. HEAD OFFICE KATHMANDU Name Of IP Assigned Server Relay Server DHCP IMS with DNS RODC File Server Print Server 192.168.100.1 192.168.100.3 200.200.100.1 192.168.100.2 192.168.100.77 192.168.100.10 Subnet Mask Prefix Length Gateway 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0 26 26 26 26 26 26 192.168.100.1 192.168.100.1 192.168.100.1 192.168.100.1 192.168.100.1 192.168.100.1 NEW BANESHWOR BRANCH Name Of IP Assigned Server CDC RODC Print Server DHCP Server 192.168.100.88 192.168.100.44 192.168.100.10 192.168.100.3 Subnet Mask Prefix Length Gateway 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0 26 26 26 26 192.168.100.2 192.168.100.2 192.168.100.2 192.168.100.2 Server that I have used: DHCP: This is the network management protocol used to dynamically assign an IP address on any device or node on the network so that they can communicate using IP. DHCP automates and centrally manages these configurations, and does not require that network administrators manually assign IP addresses to all network devices. DC: This means the domain controller. This is the server that leads to the desire for a security conformation in the Windows server domain. It supports the approach to a set of network resources for a group of users. In order for a domain to access sources, the user only needs to log on to the system. Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 CDC: It is intended for the controller of the child domain. A child domain is another domain that falls under the parent domain in the active directory domain in the hierarchy. This is similar to the first root of a tree used for the boundaries of securities, with low network traffic and an administrative overhead. RODC: It is only for a read-only domain controller. This allows us to save the active directory (AD). It is mainly used in a branch office that cannot support its own domain controllers. It provides functions such as safer settings for remote locations, such as a branch, RODC administrator, etc. Explanation of network devices: The network devices are: Router: A router is a tiny electronic device that connects collective computer networks to each other through wired or wireless connections that examine the contents of data packets being transmitted on the network or in other networks. Switch: A device that routes incoming data packets from different ports and forwards them to the desired location on a local area network (LAN) is called a switch. A switch in the local Ethernet network addressed from the physical device determines in each frame of the incoming message an output port for forwarding it to and from. The switches are smarter, but they are similar to concentrators. Printer: The printer is an output device that receives and displays images from computers and transfers this input to paper or prints paper documents. Electronic data is sent from computers to printers to print a document. Access point: An access point is a station on a local area network (LAN) that provides wireless devices and wired networks for linking transmitted and received data. It provides communication between the WLAN and the supported wired network and connects users to other users on the network. Firewall: A network security system designed to secure a private network is called a firewall. It can be performed as hardware and software, and a combination of both. Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Explanation of network Components: Users: An authority that has control over the use of the application and its objects. Groups: Collections of users with equal permissions. Organizational unit: A container for storing users, groups and computers is called an organizational unit. Membership: Membership granted to other clients by the domain controller. Group policy: It implements configurations for users and computers. Conclusion: So, using the Visio tool, I built this network project as shown in the above figure, which looks at the various server technologies that are connected across different network devices and various components. Task 9[P6] Test and evaluate the design to meet the requirements and analyze user feedback. Introduction: The design that must meet the requirements to analyze user feedback is described here in this task. The process of finding, analyzing and investigating any service, to complete, to find out whether it works properly or not, is called testing. This helps to find out what error it is. Here we are going to prepare a test log of what we tested, and what the expected result of this test magazine is. So the test log may be: S.N What was Expected Output Actual Output Remarks tested Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 1. DHCP The DHCP server must Since the DHCP scope Customer server be able to automatically is between 2 and 50, requirements for the assign IP addresses to the DHCP server can corresponding 40 client computers. 2. provide up to 44 IP address IP were Domain addresses. Computers must be able Customers Controller to (DC) membership in the same of the primary server. because network. get a membership. Print server 3. connect required. received Requirements to the membership view been fully satisfied, Custom computers must Customers be able to have share have The customers requirements a access to a shared have been fully met, printer. printer. as clients gain access to the printer Web server 4. VPN server 5. On the client computer, Web pages were seen The requirements the web page on the on the main server. were fully met, as the primary server should web page was seen on be displayed using the the server. primary site. The client computer can The client computer The assign connection. a requirements VPN was able to assign were fully met. VPN connections Evaluation of the design: Network design for communication between Nepal Bank Limited and its affiliate was triumphantly designed, and a test log was executed where the organization's requirements were met. Evaluation of design is also another important part to consider why it is suitable. Therefore, some of the reasons are mentioned below that the network I built is suitable for organizations. Reliability: Reliability is the function of any computer component, such as hardware or network, or software that regularly executes in accordance with requirements. It refers to the type of application, Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 delivering packets from the source to the desired source. Not only the level of communication, but also the components of network communication devices, such as a firewall, routers, a switch, etc., must also be reliable. Reliability also means compatibility, which indicates whether the created network is compatible or not. Since I created a network for Nepal-Bank, taking into account all the requirements and requirements of the organization. Bandwidth: Bandwidth is defined as a range in the frequency range or wavelength range. Bandwidth is also defined as the amount of data that can be transmitted over a certain period of time. It determined the speed of data transfer in any network. This does not limit the speed of the Internet. In my network design, I used sufficient bandwidth to simultaneously transmit and receive more data. Scalability: Scalability is a function that explains the ability of a process, network, software or organization to support increased demand. It's very easy to apply. When the network is built, we want it to work for a long time and do not need to change it again. Scaling the network means creating a network design for the present and the future, and both. We do not need to redesign the whole project in time, only small changes can be made at the request of the organization, if the scaling was done at the beginning. In my project, I also scaled the network to consider the changes that might arise in the future, and to adapt the possibilities of future preferences. Feedback from the end user: Independent feedback Project name: Nepal Bank Networked system Feedback Given By: Priti Yadav Pr Signature: Date: Project Description: The project was built to establish a connection between the head office located in Kathmandu and the branches of Nepal Bank Limited. This was possible only on different servers as a DHCP server, a DC server, a RODC server, a CDC server, a VPN server, etc. Important features of the project: Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Communication takes place in private networks, and in this network system a virtual network of the main office and a branch of using VPN are implemented. It also has a character like a domain-based network system, since it helps all the other computer to become a member of the core server and easily approach files and the required data. Checklists Yes No Comment Have recognized objects and data structures required to the system? Does the prepared design meets the requirement of client Is security was good enough? Does network system contain scalability i.e. suitable for further use in future? Is the networked system flexible? Is it easy to operate? Is it reliable? Project Limitation Despite its various advantages, it does not have a secondary DNS. This is a small unpleasant difference or error when preparing a network design. However, this can be fixed. Feedback Evaluation Feedback Evaluated Signature: By: Razan Yadav Date: Evaluation of the system: The overall assessment of the system determines that the result is good, while some restrictions also come, which can soon be met as soon as possible. Recommendations for future consideration: The key factors that determine the network system are scalability, which can be changed to meet the requirements of the organization. The prepared network system should be timely updated, updated and analyzed by time to increase it in the future. Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Conclusion: Hence, I have provided a test log for different servers that were worn in the network design, as well as the expected output and actual output. I also correctly assessed various factors to meet the requirements of network systems and user feedback on network design. References And Citation Revolvy, L. (2019). "Network topology" on Revolvy.com. [online] Revolvy.com. Available at: https://www.revolvy.com/topic/Network%20topology [Accessed 11 Apr. 2019]. Networkskyx.com. (2019). Network SkyX. [online] Available at: http://www.networkskyx.com/ [Accessed 11 Apr. 2019]. Anon, (2019). [online] Available at: http://www.academia.edu/12384294/computer_dictionari [Accessed 11 Apr. 2019]. Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)