Networking Technology Building a Computer Network for “Flexi Lease Finance (Pvt.) Ltd” Company Networking Technology Acknowledgement Page 2 Networking Technology Exclusive Summary This scenario was basically based upon implementing of a networking system to “Flexi Lease Finance (Pvt.) Ltd” Firstly a suitable topology and network architecture had to be chosen for the network system of “Flexi Lease Finance (Pvt.) Ltd”. Then the routing protocols had to be recommended according to the requirements requested from “Flexi Lease Finance (Pvt.) Ltd” to the network system that is to be implemented. Then suitable hardware and software for this new infrastructure had to be selected along with their functions mentioned. Then the network system had to be provided along with necessary justification where possible. Under the practical session installation of a server OS and setting up of Active directory and DNS were undertaken. At last a maintenance schedule was provided to support with the network system which included backups, upgrades, security and auditing. Page 3 Networking Technology Contents Acknowledgement ..................................................................................................................... 2 Exclusive Summary ..................................................................................................................... 3 Introduction ............................................................................................................................... 8 Task 1 ..................................................................................................................................... 9 What is a network? ..................................................................................................................... 9 Types of networks........................................................................................................................ 9 LAN – Local Area Network ....................................................................................................... 9 MAN – Metropolitan Area Network ......................................................................................... 10 Benefits of networking .......................................................................................................... 10 Drawbacks of networking ...................................................................................................... 11 What is a topology? .............................................................................................................. 11 Benefits of Star Topology .......................................................................................................... 12 Drawbacks of Star Topology ...................................................................................................... 12 Benefits of Bus topology ........................................................................................................... 13 Drawbacks of Bus topology ....................................................................................................... 13 Benefits of Ring Topology.......................................................................................................... 14 Drawbacks of Ring Topology ..................................................................................................... 14 Benefits of Tree Topology ........................................................................................................ 15 Drawbacks of Tree Topology ..................................................................................................... 15 Benefits of Mesh Topology ....................................................................................................... 15 Drawbacks of Mesh Topology ................................................................................................... 15 Recommended Topology to the network system ...................................................................... 16 Networking Architectures ......................................................................................................... 16 Benefits of Peer to peer network .............................................................................................. 17 Drawbacks of Peer to peer network .......................................................................................... 17 Benefits of Client- server network ..................................................................................... 17 Drawbacks of Client- server network ................................................................................. 18 Recommendation of Network Architecture to “Flexi Lease Finance (Pvt.) Ltd” ........................................................... 18 Task 2 ................................................................................................................................... 19 Page 4 Networking Technology What is Bandwidth? .............................................................................................................. 19 What is a Throughput? ..........................................................................................................19 How to get the maximum throughput? .................................................................................20 Comparison between various IEEE 802 standards ..................................................................20 • IEEE 802.3: Ethernet ......................................................................................................21 • IEEE 802.4: Token Bus.................................................................................................... 21 • IEEE 802.5: Token Ring .................................................................................................. 22 Recommendation of a suitable IEEE 802 standard to the Dress designing company ““Flexi Lease Finance (Pvt.) Ltd”” ………………………………………………………………………………………………………………………………………22 Task 3 ................................................................................................................................... 23 What is Routing? ................................................................................................................... 23 Difference between routed and routing protocols ................................................................. 23 Routed Protocol .................................................................................................................... 23 Routing Protocol ................................................................................................................... 23 Distance Vector Routing Protocol .......................................................................................... 24 Advantages of Distance vector routing protocol .................................................................... 24 Disadvantages of Distance Vector routing protocol ............................................................... 24 Link- State Routing Protocol .................................................................................................. 25 Advantages of Link-state routing protocol ............................................................................. 25 Disadvantages of Link-state routing protocol......................................................................... 25 Hybrid Protocols ................................................................................................................... 25 Task 4 ................................................................................................................................... 27 Hardware Devices ................................................................................................................. 27 Monitor ................................................................................................................................ 27 Switch ................................................................................................................................... 28 Cables ................................................................................................................................... 28 Server computer ................................................................................................................... 28 Routers ................................................................................................................................. 29 Network interface card ......................................................................................................... 29 Printer................................................................................................................................... 29 Firewalls................................................................................................................................ 29 Page 5 Networking Technology Software ............................................................................................................................... 30 Task 5 ................................................................................................................................... 32 Webmail Server ....................................................................................................................32 DNS Server ............................................................................................................................32 DHCP Server ..........................................................................................................................33 File Server .............................................................................................................................33 Print Server ........................................................................................................................... 34 Task 6 ................................................................................................................................... 35 Network interface card ......................................................................................................... 35 Processor .............................................................................................................................. 35 RAM 36 Hard disk ............................................................................................................................... 36 Monitor ................................................................................................................................ 36 Mouse................................................................................................................................... 36 Keyboard .............................................................................................................................. 36 Task 7 ................................................................................................................................... 37 Marketing department .......................................................................................................... 37 Account department ............................................................................................................. 38 IT department ....................................................................................................................... 39 Design department ............................................................................................................... 40 Task 8 ................................................................................................................................... 42 Critically evaluate and justify the network design you created. (L3.2) .................................... 42 Task 9 ................................................................................................................................... 43 Task 10 ................................................................................................................................. 43 Task11 .................................................................................................................................. 43 Task 12 ................................................................................................................................. 43 Tasks 13 ................................................................................................................................ 44 Task 14 ................................................................................................................................. 64 Hardware .............................................................................................................................. 64 Software ............................................................................................................................... 64 Design ................................................................................................................................... 64 Technology ........................................................................................................................... 65 Page 6 Networking Technology Task 15 ................................................................................................................................. 66 Maintenance Schedule - Upgrades / Updates / Security ........................................................66 Maintenance Schedule - Auditing ..........................................................................................67 Conclusion ............................................................................................................................68 Lesson Learned Report .........................................................................................................69 Referencing .......................................................................................................................... 70 Content of Figures Figure 1: Star Topology…………………………………………………………………………..12 Figure 2: Bus Topology ............................................................................................................ 13 Figure 3: Ring Topology ........................................................................................................... 14 Figure 4: Tree Topology ........................................................................................................... 14 Figure 5: Mesh Topology .......................................................................................................... 15 Figure 6: Peer to peer network .................................................................................................. 16 Figure 7: Client- server network ................................................................................................ 17 Figure 8: Monitor ...................................................................................................................... 27 Figure 9: Switch........................................................................................................................ 28 Figure 10: Printer ...................................................................................................................... 29 Figure 11: Microsoft Office....................................................................................................... 30 Figure 12: NIC .......................................................................................................................... 35 Figure 13: Mouse ...................................................................................................................... 36 Figure 14: Keyboard ................................................................................................................. 36 Figure 15: PC, Printer, switch, router ........................................................................................ 37 Figure 16: marketing department ............................................................................................... 37 Figure 17: Account department ................................................................................................. 38 Figure 18: IT department........................................................................................................... 39 Figure 19: Designing department .............................................................................................. 40 Figure 20: Whole network ......................................................................................................... 41 Page 7 Networking Technology Introduction This scenario is basically based upon implementing a networking system to “Flexi Lease Finance (Pvt.) Ltd”. A network is a series of computer systems that are linked together so that they are able to share computing power or storage facilities among others system of “Flexi Lease Finance (Pvt.) Ltd”. Then the routing protocols have to be recommended according to the requirements requested from “Flexi Lease Finance (Pvt.) Ltd” to the network system that is to be implemented. Later the suitable hardware and software for this new infrastructure has to be selected along with their functions mentioned. Then the network system has to be provided along with detailed justification where possible. Firstly a suitable topology and network architecture has to be chosen for the network. Under the practical session installation of a server OS and setting up of Active directory and DNS is being undertaken along with some screen shots provided with this. At last a maintenance schedule has to be provided to support with the network system which included backups, upgrades, security and auditing Page 8 Networking Technology Task 1 Propose a suitable topology and a system type for the above mentioned organizing by discussing the benefits of different topologies and system types. What is a network? A network is a series of computer systems that are linked together so that they are able to share computing power or storage facilities among others. There are various types of networks available. They are: • LAN – Local Area Network • WAN – Wide Area Network • MAN – Metropolitan Area Network • PAN – Personal Area Network • CAN – Campus Area Network Types of networks LAN – Local Area Network Basically LAN refers to a network within a small geographical area. Usually this small area can in a single building or sometimes LANs can be spread through several buildings on the same site. LANs are mostly owned and managed by a single person or by a particular company. Technologies used in LAN are Ethernet and Token Ring. • WAN – Wide Area Network Generally WAN is regarded as a collection of LANs. It spreads within a wide geographical area. Using WANs, computers may be linked together in different countries using satellites, microwaves or telecommunication links. In here separate LANs would be connected to separate routers in order to perform a wide area network. WANs are not owned and managed by a single person, it has distributed owners. Technologies used in Page 9 Networking Technology WANs are ATM, frame relay and x.25 Page 10 Networking Technology • MAN – Metropolitan Area Network It is a new class of a network where it serves a role which is quite similar to ISP. A MAN often acts as a high speed network to allow sharing of resources. It is larger than a LAN but smaller than a WAN. Generally MANs can be used in a city. WAN is not owned by a single organization but it is owned a single network provider who sells the service to the users. • PAN – Personal Area Network When compared to local area network, wide area network PAN is quite different. It is because Personal are network can be interconnected without wires to the internet or other networks. Generally PAN is a communication among the personal devices themselves, or for connecting to a higher level network and the internet. CAN – Campus Area Network CAN is referred to the networks required by campuses. It is larger than a single LAN but smaller than a MAN. Generally in here CAN is interconnecting few LANs within a university campus. Benefits of networking • Expensive peripheral devices can be shared among users which would be much more beneficial. • It avoids having duplication of information as all users can access the same files. • Data and software can be stored centrally which means the maintenance would be much easier. • Users within the network can communicate among each other which would be beneficial. Page 11 Networking Technology Drawbacks of networking • Higher security risk is being involved. • Skilled IT staff is required to setup networks and for management of networks. • Data traffic might arise which would be difficult. • Viruses can be spread easily within a network of several nodes being connected to each other. • In case of sever failures the network would be affected. • Cost incurred is quite high. What is a topology? Basically networking topology is referred to the way in which the elements of a network are mapped. Networking topologies are divided into physical and logical topologies. Physical topologies are referred to the configuration of cables, computers and other peripheral devices whereas logical topologies are referred to as passing down the information among the work stations. Generally networking topologies can be divided into several types as listed below. Types of Networking Topologies • Star Topology Topology Bus Topology Ring Topology Tree Topology Mesh Star Topology One of the common types of networking topologies used today is star topology. Generally it is regarded as star topology since each and every computer within the network is being directly connected to a central network known as hub or switch and are allocated according to a format of a star as shown below. Commonly in a star topology the data passes through the switch/ hub before reaching the destination point. It is said that the hub/ switch Page 12 Networking Technology acts as a repeater to the data flow in a star topology since it manages and controls all the Figure 1: star topology Functions within the network Benefits of Star Topology • Can be expanded easily without any disruption to the network. • It is quite easy to troubleshoot. • One of the major benefit is that data doesn’t pass through various nodes in the star topology unlike in the Bus topology • Broken – down nodes within the network can be easily removed without affecting to the other nodes within the network. Drawbacks of Star Topology • If the switch/ Hub fail to work then the nodes connected will be affected. • Transfer of data and the capability is based mainly upon the capability of the central hub. • Cost is incurred when installing of switch/ hub to the network in order to connect the nodes in the network. Bus Topology Unlike star topology, in the bus topology all the nodes are not connected to a central hub / switch. Therefore it is very much clear that each and every node in the network has an equal status. In the bus topology the data is not being sent to all the devices within the particular network at the same time which means that if one node is not working properly where the others computers won’t be affected which is much more Figure 2: Page 13 Networking Technology Bus topology beneficial when compared with other network topologies available. Benefits of Bus topology It is cheap and reliable. • It is quite easy to connect the devices in the network to a linear bus • It requires less cable length when compared to star topology • Less cost id required when compared to star topology since no central hub/ switches are being required Drawbacks of Bus topology • If a problem occur within the main cable then the whole network would be affected • It is quite difficult to identify the problem if the entire network shut down at once • Network disruptions might arise when computers are being added or removed Ring Topology In the ring topology all the nodes and other devices within the network are connected together in a circle like a ring as shown in this picture. Benefits of Ring Topology • Easy to wire and install • It is quite easy to detect faults • It has equal access to all the devices no one computer will use all the bandwidth Figure 3: Ring topology Drawbacks of Ring Topology • If there is a break down in any part of the communication line then all the devices within the network would be affected • It is slow since the signals goes in a sequential order • Single break in cable can disrupt the flow of network Page 14 Networking Technology Tree Topology When compared to the above mentioned main topology types, tree topology is quite different. A tree topology connects multiple star networks to other star networks as shown below in the diagram. Nodes within the star topologies would be able to communicate among each other. However if the main cable where the star topologies are connected fails then those networks would be unable to communicate among each other. Figure 4: Tree topology Benefits of Tree Topology • It is more manageable as it divides the network into sub- parts • It is quite efficient and suitable for larger networks where ring and star topologies are not that effective enough Drawbacks of Tree Topology • The network is vulnerable since it depends upon the main cable. If the main cable fails then the star / ring topologies connected to the main cable would be unable to communicate among each other • If the network becomes too much large then it would be difficult to manage Mesh Topology Simply mesh topology is defined as it combines the characteristics of bus, ring and star topologies. Basically it consists of groups of star- configured workstations connected to a linear bus backbone cable and ring networks. It is said that mesh topologies allow for the expansion of an existing Page 15 Figure 5: Mesh topology Networking Technology network and enable companies to configure a network to meet their needs effectively. Benefits of Mesh Topology • It provides redundant paths between devices • The network can be expanded without any disruption to current uses Drawbacks of Mesh Topology • Complicated implementation is being required • If the backbone line breaks unfortunately then the whole segment goes down Requires more cables than other LAN topologies Recommended Topology to the network system According to the data provided in the scenario it is said that “Flexi Lease Finance (Pvt.) Ltd” It is said that all the servers are in the IT room and files are to be stored in a central location as well as they require common network drive of the network for the proposed one to “Flexi Lease Finance (Pvt.) Ltd” and also it is clearly said that the marketing and all the departments too are considered to be on different networks. Therefore recommending star topology as a suitable networking topology for “Flexi Lease Finance (Pvt.) Ltd” would be much more applicable since a common network is being required. Also it can be expanded easily without any disruption to the network. However recommending ring or bus won’t be worthwhile since they don’t have common network within the network as “Flexi Lease Finance (Pvt.) Ltd” .top level designers accessing the company network from outside. Networking Architectures There are two types of networking architectures available. They are: 1. Peer to Peer 2. Client – server Page 16 Networking Technology Peer to peer Basically peer to peer network architecture is referred to as a network which is being created when two or more nodes are connected to each other and resources are being shared among them rather than through a dedicated server computer. It can be a network on a much large scope where special protocols set up direct relationships among users over the internet. Figure 6: Peer to peer network Benefits of Peer to peer network • Less cost is incurred as servers are not required • There is no need to full- time administrators • The user can control their shared resources as they want • Peer to peer is much more reliable as central control is eliminated • Failure of one peer won’t affect the functioning of the other peers unlike in client server once the server breaks down then the whole network would be affected. Drawbacks of Peer to peer network • The level of security is quite less • Unlike client server, in P2P the whole system is not centralized. • Data recovery is quite difficult. • Each and every node should have their own back-up systems. Client- Server Network Architecture When compared to P2P the client server network architecture is quite different. Clientserver network architecture is a network in which many clients appeal and receive resources from a centralized server or the Page 17 Networking Technology host computer. Here the servers wait for the requests and provide with what the clients request. Benefits of Client- server network • It is easier to back up files Level of security is quite high. Figure 7: client-server network • Centralized resources • All the data are stored in one location where searching for a particular file would be much easier. • It is efficient when compared to P2P. Drawbacks of Client- server network • Initial cost is high • Skilled people are required for configuration and management • If the server breaks down then the whole network would be badly affected. Recommendation of Network Architecture to “Flexi Lease Finance (Pvt.) Ltd” According to the scenario it is said that Thoughts refer a common network within the whole system. Therefore when considering the above mentioned points of both peer to peer network and client- server network, recommending Client- server network architecture to “Flexi Lease Finance (Pvt.) Ltd” would be much more applicable though the cost is high having a common network drive is much more important. Task 2 Page 18 Networking Technology Discuss the importance of bandwidth for the organization while mentioning how to get the maximum throughout? Compare various IEEE 802 standards and recommend one or more standards for the organization with reasoning. (L1.2) What is Bandwidth? Basically bandwidth refers to the maximum amount of data that can be transferred through a network for a specified period of time while the throughput is the actual amount of data that can be transferred through a network during a specified time period. Bandwidth also determines how fast a website takes to load its page. Also it is said that that Bandwidth is the cause why an internet user might experience a file or a video to download faster from one website and the exact file to take longer to download from another website. What is a Throughput? Generally network throughput refers to the volume of data that can be sent through a network. The network throughput is constrained by factors such as network protocols, capabilities of routers as well as switches and the type of cabling used to create a network whereas the network throughputs in wireless networks would be affected by the capability of network adapters on the client systems. Network throughput is measured in bits per second (bps). How to get the maximum throughput? Generally maximum throughput is very much closely related to the network capacity which is the highest speed of delivery in a much complex network. Therefore in order to obtain the maximum throughput some steps have to be undertaken as mentioned below. • Firstly the bandwidth size has to be finding out in terms of bits per second. • Then have to determine the minimum latency between the PC and the web page. Page 19 Networking Technology • Next have to note the time displayed in milliseconds. • At last have to multiply the lowest latency time by the bandwidth in order to obtain the maximum throughput. Comparison between various IEEE 802 standards IEEE 802.1: Bridging and Management IEEE 802.2: Logical Link Control IEEE 802.3: Ethernet IEEE 802.4: Token Bus IEEE 802.5: Token Ring IEEE 802.6: MANs IEEE 802.7: Broadband LAN using coaxial cable IEEE 802.8: Fiber Optic TAG IEEE 802.9: Integrated Services LAN IEEE 802.10: Interoperable LAN Security IEEE 802.11: Wireless LANs IEEE 802.13: Unused IEEE 802.14: Cable Modems IEEE 802.15: Wireless PANs IEEE 802.16: Broadband Wireless MANs IEEE 802.17: Resilient Packet Rings IEEE 802.18: Radio Regulatory TAG IEEE 802.19: Wireless Coexistence Working Group Page 20 Networking Technology IEEE 802.20: Mobile Broadband Wireless Access IEEE 802.21: Media Independent Handover Access IEEE 802.22: Wireless Regional Area Networks IEEE 802.23: Emergency Services Working Group IEEE 802.24: Smart Grid TAG IEEE 802.3: Ethernet Basically Ethernet refers to a computer network architecture which consists of various specified local area network protocols, connections methods as well as devices. Ethernet refers to a protocol that controls the way the data is being transmitted over a LAN. IEEE 802.4: Token Bus Token bus is regarded as a LAN access method which uses the token passing technology. The PCs’ are logically connected in a ring but are physically connected by a common bus. In here all the tokens are broadcast to every single PC within the network except the PC with the destination address which responds. IEEE 802.5: Token Ring When compared to token bus and the Ethernet the token ring is different. It is because token ring uses a token ring access method. All the PCs’ are connected to a central wiring hub. Page 21 Networking Technology Recommendation of a suitable IEEE 802 standard to the “Flexi Lease Finance (Pvt.) Ltd” According to the scenario as a network has to be implemented to the recommending IEEE 802.3 standard (Ethernet) would be much more Applicable. It is because as Ethernet refers to a protocol that controls the way the data is being transmitted over a LAN. Page 22 Networking Technology Task 3 Explain how routed protocols and touring protocols differ from each other. Discuss on any two routing protocols and select an appropriate one for your organization by providing strong justifications. (L1.3) What is Routing? The basic process in routing is the movement of packets within a network from one host to another host. It is usually performed by committed devices known as routers. Each router has a routing table. When the router gets a request he checks with the routing table and if the particular entry for the network is there in the routing table then he will forward the relevant packet to the destination. Difference between routed and routing protocols Routed Protocol In routed protocols it actually sends traffic between devices running at layer 3 in the OSI model. Routed protocols carry information used by routing protocols. Routing Protocol Routing protocols helps the router to decide which paths to send traffic. It allows the routers to dynamically advertise and learn and use efficient routes to the destination. Also the routing protocols specifies how routers changes and share information with the other routers in the network that they can reach. A routing protocol allows the network to dynamically adjust to change conditions else all the routing decisions have to be predetermined and will remain static. Routing protocols are generally divided into distance vector, Link-state, etc. Page 23 Networking Technology Distance Vector Routing Protocol Basically routers use distance vector-based routing protocols in order to periodically advertise the routes within their routing tables. Basically the distance vector routing protocol know routes by measures of distance and vector as reported by the neighboring routers. Distance-vector routers are compared with information from road signs. Advantages of Distance vector routing protocol • Simpler • Easy to configure Disadvantages of Distance Vector routing protocol • Larger routing tables • High network traffic overhead • High convergence time RIP v1 (Routing Information Protocol) RIP V1 (Routing Information Protocol) is a type of a distance - vector protocol that uses the hop count as it’s metric. The routing information protocol is been rapidly used for the routing traffic within the global internet and is an central gateway protocol (IGP) which means that it performs routing only within a single autonomous system. RIP V2 RIP V2 is also a distance vector routing protocol and it consist of the following features. Authentication is available Flat network structure Routing table update No. of hop count is 15 Page 24 Networking Technology Link- State Routing Protocol When compared to distance vector routing protocol link state routing protocol are routing protocols whose algorithms that calculate the best paths to networks differently. Also the link state routing protocol calculate their network routes by building a complete topology of the whole network are and then only the calculation of the best path from the topology is undertaken or mapping of all the interconnected networks take place. Advantages of Link-state routing protocol • Lower convergence time • Low network overhead • Smaller routing tables Disadvantages of Link-state routing protocol • More difficult to configure • Complex OSPF ( Open Shortest Path First) OSPF (Open shortest path first) is a link - state routing protocol which is being developed for Internet Protocol (IP) networks by the interior gateway protocol (IGP). Hybrid Protocols Hybrid routing protocols are a combination of both distance vector routing protocol as well as the link- state routing protocol. EIGRP (Enhanced interior gateway routing protocol) Basically Enhanced interior gateway routing protocol (EIGRP) is known as a central gateway protocol which is being appropriate for many different topologies and Medias. EIGRP is a combination of both distance- vector and link- state routing protocol known as hybrid protocol. In a well designed and implemented network system the EIGRP would scale properly and provide with extremely quick convergence times with minimal network traffic. Most beneficial is that it has rapid convergence times for Page 25 Networking Technology changes in the network topology. Even if a change occur only the routing table will be changed where necessary not the entire routing table will change which will ultimately reduce the load that the routing protocol itself places on the network. Only very low usages of network resources are being required at normal an operation which is another benefit of this protocol. Therefore when concerning upon the scenario provided in the case recommending the EIGRP protocol as a routing protocol would be much more applicable since it would be much more suitable to “Flexi Lease Finance (Pvt.) Ltd” the newly established Dress designing company as it tackles with the required recommended topologies to the system provided and also EIGRP would be much more applicable since all the networking products that are used by “Flexi Lease Finance (Pvt.) Ltd” dress Designing company is Cisco products. Page 26 Networking Technology Task 4 Critically discuss and select a suitable hardware and software components needed in order to create this new network infrastructure by mentioning their functions. (L2.1) Hardware Devices Computer hardware refers to the physical parts of a computer and related devices. Internal hardware devices include motherboards, hard drives and RAM. External hardware devices include monitors, keyboards, printers and scanners. Following listed hardware devices would have been recommended for Sky-net which would help them to satisfy the requirements of the management. Monitor Within the modern world today monitor has become one of the common output device. It is also known as VDU (Visual Display Unit). Pixel is the name given to a picture element and refers to the smallest area of the screen. The entire screen is made out of lot of pixels. Screens are normally classes as low resolution, medium resolution and high resolution. Different types of monitors are available: standard computer monitors, Liquid Figure 8: Monitor crystal display and standard television set. Therefore according to the given scenario recommending LCD monitors as a hardware component would be wise since the case is basically based upon Dress designing company and staff recommending LCD monitors would be suitable as it would have less affection to the eyes and as well as its eco friendly. Switch Page 27 Figure 9: Switch Networking Technology Switch is a common connection point for devices in a network. It is generally regarded as an intelligent device. Switches are commonly used to connect segments of a LAN. A switch contains of multiple ports. The basic process in a switch is that the data packet will be sent to the particular destination once the destination IP is being recognized. As the scenario says that the system requires a common network recommending a Cisco switch for the implementation of the new networking to “Flexi Lease Finance (Pvt.) Ltd” would be much more reasonable. Cables Basically network cables are used to connect network devices to another network device. There are different types of cables available. They are: fiber optic, copper cables, twisted pair and co-axial cables. This is the cable suitable to a network. These can be used to connect routers, switches as well as PCs to the network. Therefore recommending RJ45 cable would be much applicable according to the information provided in the scenario about the requirements of the “Flexi Lease Finance (Pvt.) Ltd” dress designing company. According to the scenario provided as the newly established dress designing company “Flexi Lease Finance (Pvt.) Ltd” is requiring a fast Ethernet to their network system recommending UPT category 5E cables to the network system would be much more reasonable. Server computer It would be easier to maintain. With the use of server computers the files can be managed in a much easier manner. The server can be updated when necessary. Routers Routers are layer 3 devices which is the network layer. Each port of a router is in one collection domain and one broadcast domain. Routers can be used as they can identify the path of the network. Routers would be much more suitable in order to connect all the switches in separate floors where then it can be linked to the DNS server and then through the firewall directly to the internet. Therefore recommending Cisco routers to Page 28 Networking Technology “Flexi Lease Finance (Pvt.) Ltd” dress designing company would be much more reasonable. Network interface card Generally network interface card is used to connect a computer to an Ethernet network. According to the scenario as the Ethernet is being recommended this workstation hardware would be much more suitable. Printer Printer is device that is device that is being used to prepare hard-copy outputs. Printers come in the form of several Figure 10: Printer types namely as Dot-matrix, Ink-jet and Laser Printers. Printer is generally regarded as a common output device. Printing quality, cost, multi stationery, speed vise Dot-matrix is cheap and low speed and quality where as Ink-jet in an average position and laser with high quality plus expensive. According to the scenario it is said that each department has a separate printer to be equipped. Therefore it is clear that printer has to be listed out as a suitable hardware requirement to “Flexi Lease Finance (Pvt.) Ltd”. Firewalls Generally firewalls can be defined as Hardware or Software that is being used to secure the network. The Firewall controls all incoming and outgoing data packets and allows only data packets that are necessary in all 7 layers and secure to the network. Basically a fire wall is placed between the public network and the beginning of the private LAN. Software Software is the general program given to all the programs that can be run on computer hardware. It consists of programs and applications that run on computers as software runs on computer hardware, software programs often have system requirements that list the minimum hardware required for the software to run. Software is categories into system software and application software. Page 29 Networking Technology Application Software Application software is used to perform a specific task. It is an additional issue. Unlike system software, application software Figure 11: Microsoft office is not compulsory to be installed as computers will run without application software. Eg: Microsoft word (Word Processing), MySQL(Database software), Microsoft Power point(Presentation Software), Adobe Photoshop (Graphics software) and also Flash player software. According to the scenario as this is dress designing company availability of the application software as mentioned above like Microsoft word, power point, and Photoshop recommending this to “Flexi Lease Finance (Pvt.) Ltd” would be much more applicable. System Software However when compared with application software, system software is quite different. System software includes of the software need to run the system and it is a must to have system software in order to run the system. This is similar to an operating system. Without an operating system a computer would be useless as operating system is the program that manages and control hardware and software directly. Eg: Windows 7, BIOS software, windows 8 Windows 7 for workstations One of the famous currently used operating system these days is windows 7. It is being used by various users such as in institutes, offices, home and many more places as it is available with many functions and mainly since it user friendly. Such facilities available are: • Libraries Page 30 Networking Technology • Network and sharing revisions • View available networks • Direct access • Smart network power As it is available with more valuable functions recommending windows 7 as important system software to “Flexi Lease Finance (Pvt.) Ltd” would be much more applicable as it is a dress designing company with staffs and designers. Server 2008 According to this scenario given a network system has to be designed to a newly established dress designing company known as “Flexi Lease Finance (Pvt.) Ltd”. Therefore server 2008 has been recommended to this company. Task 5 Discuss on the types of servers you need for this organization with reasoning. (L2.2) According to the data provided in the scenario as the network has to be implemented to “Flexi Lease Finance (Pvt.) Ltd” the Dress designing company, recommending the followings servers would be much more applicable. • Webmail Server • DNS Server • DHCP Server • File Server • Print Server Page 31 Networking Technology Webmail Server The role of a webmail server is quite different when compared to DNS server and DHCP server. It is because if a company or an organization wants to maintain their own mail address then the webmail server would be much more essential. Email server is also responsible for saving all emails of the user accounts and also to send and receive Emails from other Email services. So it is clear that recommending the webmail server to “Flexi Lease Finance (Pvt.) Ltd” dress designing company would be much reasonable since it would require their own mail address as it is a dress designing company and as it would be much easier when dealing with emails. DNS Server DNS server generally stands for Domain Name server. Basically the main purpose of this server is that it provides particular IP addresses when needed for particular websites where you no more have to memorize all the IP addresses in order to log into a particular website. DNS server makes it possible for the users of client computers to use names instead of numerical values for the IP addresses in order to identify their remote hosts. Once the name of a remote host has been sent to the DNS server it would respond with a matching IP address. Then the client computer would be easily able to send messages directly to the remote host’s IP address. Therefore according to the data provided in the scenario as a network has to be implemented to “Flexi Lease Finance (Pvt.) Ltd” dress designing company, recommending Domain Name Server (DNS Server) as a server would be much more reasonable. It is because as this company will consist of several department with many computers equipped which will require certain IP addresses; it would help in identifying the proper IP address in order to transfer data to when necessary rather than memorizing the IP addresses. Page 32 Networking Technology DHCP Server Generally DHCP server stands for Dynamically Host Configuration Protocol. The main purpose of the DHCP server is that it dynamically configures IP addresses. It centrally manages IP addresses and related other information and provide to the clients automatically. DHCP server would allow you to arrange client network settings at a server rather than configuring them at each and every client computer. Therefore in order to distribute IP addresses to the client computers configuring the computer as the dynamically host configuration protocol (DHCP Server) would be reasonable. However as the DHCP server plays a major role in networking, recommending it as a server to “Flexi Lease Finance (Pvt.) Ltd” dress designing company would be much more applicable when configuring IP addresses to the computers. File Server One of the most important servers that are needed for a network is the file server. It is because the file server provides a centralized location to the network in order to store and share all the files with the users within the network. If a user request for an important file then they can easily access that particular file on the file server which would save time too. Therefore if the users want to access to certain files and network accessible applications then configuring this as the file server would be reasonable enough. So as a result recommending the file server to the implementation of the network to the dress designing company would be much more applicable since it would provide a centralized location to store and share important files within the network and among the users within the network. Print Server Basically this print server is required to a network mainly in order to perform printing related tasks. Here the print server makes queue of printing jobs according to its origin of priority. Also it informs the printer status to administrator for example the server indicates that the printer is running out of printing ink, running out of paper, etc. Page 33 Networking Technology According to the data provided in the case as it says that each department is accompanied by a separate printer recommending the print server for the implementation of the network system to Dress designing company “Flexi Lease Finance (Pvt.) Ltd”would be much applicable. Page 34 Networking Technology Task 6 Discuss the inter-dependence of workstation hardware with network components. (L2.3) The following will show the necessary requirements that are being required by client users of “Flexi Lease Finance (Pvt.) Ltd” within the network system. Network interface card Generally network interface card is used to connect a computer to an Ethernet network. According to the scenario as the Ethernet is being recommended this workstation hardware would be much more suitable. Mostly performed function of a network interface card is Figure 12: NIC to provide with a physical link to a computer network. This connection will basically allow the computers to communicate within the servers as well as with the other computers within the network. Each network interface card (NIC) has a unique serial number which is also known as a MAC address. Each and every computer that is being connected to the network is required to have a unique MAC address that has to be stored with the network interface card. Therefore it is quite clear that a network interface card plays a quite major important role when regarding of a network system. Therefore it is quite clear that recommending Chelsio Network Interface Card to this network system would be much more reasonable. Processor Intel core i5 processor would be much more applicable to this as there is a higher speed which would be reasonable when compared to other processors. Page 35 Networking Technology Motherboard Recommending Intel motherboard to the dress designing company as mentioned in the scenario would be much more applicable since it includes of a higher processor speed. RAM 4 GB RAM would be much reasonable since it would raise the speed as well as the efficiency when running the system in the institute. Hard disk Recommending 500 GB hard disk would be much more applicable since it provides with a good storage space and the speed of processing would be high. Monitor According to the given scenario recommending LCD monitors as a hardware component would be wise since the case is basically based upon a dress designing company of managers and staff recommending LCD monitors would be suitable as it would have less affection to the eyes and as well as its eco friendly. Mouse Mouse is also a main input device which is required by computer systems. Mouse translates its actions on the desktop into digital information; this is fed to the computer which in turn causes the cursor to move on the screen. As the scenario is based upon implementing a network system to a newly Figure 13: Mouse established ““Flexi Lease Finance (Pvt.) Ltd””, Recommending a laser mouse (USB port) would be much more suitable as it is featured by scrolling wheel and soft rubber grips which make the mouse comfortable to use. Page 36 Networking Technology Keyboard One of the important workstation hardware requirements required by the computer system is a keyboard. Once a key has been pressed, if it has a code that depend on which key has been pressed is sent to the processing unit. Therefore it would be better if LA USB natural 4000 ERGO is being recommended as a workstation hardware to this network as it is mainly featured by spill proof and zoom slide Figure 14: Keyboard Task 7 Design a suitable networked system for the mentioned organization with proper equipment and cabling. (L3.1) pc printer switch Figure 15: PC, Printer, switch Loan department Page 37 Networking Technology Figure 16: Marketing department According to the data given in the scenario the marketing department has 10 computers with a printer as it says. IP Range:192.168.1.1/24 to 192.168.1.11/24 Savings department Figure 17: Account department According to the data given in the scenario the Account department has 8 computers with a printer as it says IP Range: 192.168.10.0/24 to 192.168.10.8/24 Page 38 Networking Technology Pawning department Figure 18: IT department It is says that 4computer and server include in the department (file severe, print server, DHCP server, webmail server, DNS) IP Range: 192.168.11.0/24 to 192.168.11.8/24 Page 39 Networking Technology Leasing department Leasing Department Loan department t Pawning department Figure 19: Designing department According to the data given in the scenario the Designing department has 15 computers. It says that design department has sub departments wedding, casual, office which are include. IP Range: 192.168.13.1/24 to 192.168.13.15/24 Page 40 Networking Technology Loan department Internet Account department& Administration Figure 20: whole network Page 41 Networking Technology Task 8 Critically evaluate and justify the network design you created. (L3.2) According to the scenario the network system was to be implemented to “Flexi Lease Finance (Pvt.) Ltd” The marketing department has 10computers with a printer which had been connected to a switch as shown in the above task. The Account and administration department s has 8 computers with a printer which had been connected to a switch. In the IT department there are 4 computers which had been connected to a switch. All the servers had been kept in the IT room (file server, print server, DNS server, webmail server, DHCP server) which will be connected to a switch and each sub department in design department has 15 computers. Then all the switches within the building of “Flexi Lease Finance (Pvt.) Ltd” will be connected to a router. Then the router will be connected to the firewall and end up in connecting to the internet. Tasks 13 Record and analyze your test results with the expected outputs. Discuss your finding. (L4.3) Test case TC 1 Test Objective Installation Process of windows 2007 Action Installing the windows 2007 Expected Results Get windows 2007 installed in the client machines Actual Results Windows 2007 has been successfully installed HND in computing and System Development Page 42 Networking Technology Conclusion Actual Results matched with the expected results HND in computing and System Development Page 43 Networking Technology Test case TC 2 Test Objective Configuring of IP addresses Action Configure the IP addresses Expected Results Actual Results Proper IP addresses, subnet masks and default gateways assigned IP addresses has been accepted by the client machines Conclusion Actual Results matched with the expected results HND in computing and System Development Page 44 Networking Technology Test case TC 3 Test Objective Installation of Active directory Domain services Action Install the Active Directory domain Expected Results Get Active directory Domain installed Actual Results Active directory domain had been successfully installed Conclusion Actual Results matched with the expected results HND in computing and System Development Page 45 Networking Technology HND in computing and System Development Page 46 Networking Technology Once the above screen shot appear new forest root domain has to be entered. Then it will automatically check whether the new forest name is already in use or not. If not it will proceed to the next step of the active directory domain installation process. Within the active directory domain installation process when the following screens appear DNS server has to be selected as additional domain controller option and proceed with the installation. HND in computing and System Development Page 47 Networking Technology Once the installation of the active directory domain is complete the above screen will be displayed. Once the finish button is clicked then installation of the active directory will be done. HND in computing and System Development Page 48 Networking Technology Preparation of groups within the newly created forest during the installation of the active directory domain When the following screen is displayed the group name has to be entered. HND in computing and System Development Page 49 Networking Technology HND in computing and System Development Page 50 Networking Technology Once the groups are being created then they will appear as follows HND in computing and System Development Page 51 Networking Technology One SS is named as “Flexi Lease Finance (Pvt.) Ltd”- Users Different user groups are based on the departments (Administration, Accounts, Marketing, design, IT) as shown in the following screen. Create new users. HND in computing and System Development Page 52 Networking Technology Preparation of users within the created groups Once the above screens appear the first name, last name and user logon name has to be entered. Test case TC 4 Test Objective Setting an appropriate password to a user created along with the permission selected Test Data Select the option user cannot change the password Expected Results The user will be unable to change the password Actual Results The user will be unable to change the password Conclusion Actual Results matched with the expected results HND in computing and System Development Page 53 Networking Technology It will be same with the other options as well. It will correspond according to the option that has been selected. File sharing process is being showed below. The following screen shot shows the selection of people within the network in order to HND in computing and System Development Page 54 Networking Technology share the file with administrator/ accounts/ marketing/ designing/ IT. Once the particular file is being shared then the following screen will be displayed requesting whether to change the sharing permission or either to stop sharing. Test case TC 5 Test Objective Changing sharing permission Action Select the option allow read Expected Results The user will only be able to read Actual Results Allow only to read not to change Conclusion Actual Results matched with the expected results HND in computing and System Development Page 55 Networking Technology It will be same with the other options as well. It will correspond according to the option that has been selected. In the permission for accounts part if the full control option is allowed then the particular user will be able to either change and to do what the user wish. If the change option is selected then the user will only be able to change but not to read. However if the access is denied then the user will be unable to access that particular shared file. A text document is being created and saved in the newly created shared folder named as Test share as shown below. HND in computing and System Development Page 56 Networking Technology Test case TC 6 Test Objective Verifying whether the file server had been installed properly Action Checking it out by sharing a folder within the server computer Expected Results Actual Results Expecting that particular folder to be shared within the client machines Had been successfully shared and available to the users. Conclusion Actual Results matched with the expected results Verifying the newly created file folder being shared as shown in the following screen. As the read option was only allowed when changing the sharing permission the user will be only able to read the text document created within the shared folder. HND in computing and System Development Page 57 Networking Technology However the user will be unable to change the data within the text document as the user permission is set as only to read. If the user attempt to change the data a message will be displayed as follows saying that the access is denied. Test case TC 7 Test Objective Installation of print server Action Install the print server Expected Results Get print server installed Actual Results Print server had been successfully installed HND in computing and System Development Page 58 Networking Technology Conclusion Actual Results matched with the expected results When the adding role wizard is displayed then the print services has to be selected in order to get it installed on the server. HND in computing and System Development Page 59 Networking Technology Installation of the print driver to the network HND in computing and System Development Page 60 Networking Technology Test case TC 8 Test Objective Verifying whether the print server had been installed properly Action Checking it out by sharing the printer within the server computer Expected Results Expecting the printer to be shared within the client machines Actual Results Had been successfully shared and available to the users. Conclusion Actual Results matched with the expected results Test case TC 9 HND in computing and System Development Page 61 Networking Technology Test Objective Changing print sharing permission Action Select the option allow print Expected Results The user will only be able to print Actual Results Allow only to print not to manage printers Conclusion Actual Results matched with the expected results It will be same with the other options as well. It will correspond according to the option that has been selected. If Manage printer’s option is selected then the user will only be able to manage printers but not to manage documents and will be same to the other option as well, special permissions. However if the user tries to manage printers while only given permission to print then the access will be denied. HND in computing and System Development Page 62 Networking Technology Before the user print the following screen will be displayed. Task 14 Recommend the enhancements you could include into this network (in terms of hardware and software or design) (L4.4, D3.6) Hardware Instead of recommending of 4GB RAM it would be better if it had been upgraded to 8GB RAM where the speed as well as the efficiency would be raised. Instead of recommending of 500 GB of hard disk it would be better if it being raised to 750 GB where the speed of processing where storage capacities are would increase. Rather than recommending UTP Category 5E cables to this network system, it would have been better if fiber optic cables have been used. It is because it carries much greater bandwidth. HND in computing and System Development Page 63 Networking Technology Software When compared to the windows 7, the window 8 is the latest release. It consists of various features such as Windows store, Automatic maintenance, Performance Boost. Therefore it would have been better if they are upgraded to Windows 8 as the maintenance is would be much easier. Design Rather than using 1 router to the entire network system, would have used more than 1 router so that the network system would have been handled in a much more efficient manner. Instead of recommending the star topology it would have been much better if Mesh topology had been used along with introducing the Wi-Fi system to “Flexi Lease Finance (Pvt.) Ltd” where it would be easy with the maintenance of the network within the entire building. Technology Cloud computing is known so since the information being accessed is found in the clouds and does not require a user to be in a specific place in order to gain access to it. Therefore recommending Cloud computing as the technology would be much more applicable to IT “Flexi Lease Finance (Pvt.) Ltd”. It is because the use of Cloud computing technology would help “Flexi Lease Finance (Pvt.) Ltd” in case of expanding the network in the future. Also it is suitable as it would reduce the cost of information management and since cloud computing structure allows the company to upgrade software more quickly would be a great benefit to a dress designing company like “Flexi Lease Finance (Pvt.) Ltd”. Therefore it is quite clear that if the above mentioned actions would have been considered then it would have helped to achieve a much more successful goal. HND in computing and System Development Page 64 Networking Technology Task 15 Design a maintenance schedule to support the network system which includes backups, upgrades, security and auditing. (L4.5,M2.5) Maintenance Schedule - Backups Department Occurrence Starting Time Time Duration Marketing Weekly 5:00 PM 1 Hour Accounts Daily 6:00 PM 45 minutes Weekly 6:00 PM 1 Hour & 30 minutes wedding Weekly 6:00 PM 1 Hour Casual Weekly 5:00 PM 30 minutes Office Daily 6:30 PM 45 minutes IT Maintenance Schedule - Upgrades / Updates / Security Department Occurrence Client Operating Yearly System updates Server Operating Yearly System updates Software - Firewall Yearly updates Application Ones a month updates Security software Yearly updates Starting Time 5:00 PM Time Duration 2 Hours 6:00 PM 4 Hours 6:00 PM 2 Hour 6:00 PM 2 Hour 5:00 PM 2 Hours Maintenance Schedule - Auditing HND in computing and System Development Page 65 Networking Technology Department Occurrence Starting Time Time Duration Marketing Monthly 5:30 PM 1 Hour Accounts Monthly 6:00 PM 1 Hour IT Weekly 6:00 PM 1 Hour wedding Weekly 6:00 PM 1 Hour Casual Weekly 5:30 PM 1 Hour Office Weekly 6:30 PM 1 Hour HND in computing and System Development Page 66 Networking Technology Conclusion This report was basically based upon implementing a suitable network system to newly “Flexi Lease Finance (Pvt.) Ltd”. Firstly a suitable topology and suitable network architecture was selected before designing the network system to “Flexi Lease Finance (Pvt.) Ltd”. Then within the next task a suitable IEEE 802 standard was recommended to “Flexi Lease Finance (Pvt.) Ltd”. Then appropriate routing protocols were selected for the network system of “Flexi Lease Finance (Pvt.) Ltd” along with suitable hardware and software was requirements were recommended to the “Flexi Lease Finance (Pvt.) Ltd”. Under task 5 the types of servers required to the network system had been mentioned along with their suitability to the “Flexi Lease Finance (Pvt.) Ltd” network system. Then within the next task the interdependence of the selected workstations with the network components had been listed out along with the suitable reasons. With all the requirements requested the network system was prepared. The process of installation of the server OS and setting up of the Active directory and the DNS, the steps incurred in order to add a workgroup computer to the domain created by assigning appropriate IP addresses, as well as the process of installing a server OS and setting up Active directory and DNS had been carried out within the practical session of this networking module. Within the next task the Installation of server OS and setting up of Active directory and DNS had been provided along with the screen shots attached to this report where the test results were analyzed with its expected outputs. Within the next task further enhancements in terms of hardware, software and design were mentioned clearly. At the end a maintenance schedule was provided along with backups, upgrades, updates, security and auditing. Therefore as a result it is quite clear that the major aim of implementing a proper network system to “Flexi Lease Finance (Pvt.) Ltd” would have been succeeded. HND in computing and System Development Page 67 Networking Technology Referencing escotal.com (2012)types of topologies [online]. Available at: http://www.escotal.com/topology.html[Accessed on 10th of December 2015] Complete pc pedia (2011) Star Topology [online]. Available at: http://www.completepcpedia.com/star_topology.html [Accessed on 10th of December 2015] Computer Hope (2013) Tree Topology [Online]. Available at: http://www.computerhope.com/jargon/t/treetopo.htm [Accessed on 10th of December 2015] ComputerWorld Inc (2013) Peer- to- peer network [Online]. Available at: http://www.computerworld.com/s/article/69883/Peer_to_Peer_Network[Accessed on 10th of December 2015] TechGenix Ltd (2013) features of windows 7 [online]. Available at: http://www.windowsnetworking.com/articles_tutorials/10-New-FeaturesWindows7-Networking.html [Accessed on 10th of December 2015] ITworld (2013) features of windows 8 [Online]. Available at: http://www.itworld.com/software/169627/10-hidden-features-windows-8 [Accessed on 10th of December 2015] solarwinds (2003) throughput [Online]. Available at: http://www.solarwinds.com/it-management-glossary/what-isnetworkthroughput.aspx[Accessed on 10th of December 2015] IEEESA (2013) IEEE standards [Online]. Available at: http://standards.ieee.org/about/get/[Accessed on 10th of December 2015] 2015] Demand Media Inc (1999) calculating maximum throughput [Online]. Available at: http://www.ehow.com/how_10005507_calculate-maximum-throughput.html [Accessed on 10th of December 2015] Microsoft (2013) DNS Server [Online]. Available at: http://technet.microsoft.com/en-us/library/cc753635%28v=ws.10%29.aspx [Accessed on 10th of December 2015] Microsoft (2013) DHCP server [Online]. Available at: HND in computing and System Development Page 68 Networking Technology http://technet.microsoft.com/en-us/library/cc756865%28v=ws.10%29.aspx [Accessed on 10th of December 2015] wisegeek (2003) Print Server [Online]. Available at: http://www.wisegeek.org/what-is-a-print-server.htm [Accessed on 10th of December 2015] Merriam-Webster (2013) Ethernet [Online]. Available at: http://www.merriam-webster.com/dictionary/ethernet [Accessed on December 2015] PCmag (2013) Token bus network [Online]. Available at: 10th of http://www.pcmag.com/encyclopedia_term/0,1237,t=token+bus+network&i=52961,0 0.asp [Accessed on 10th of December 2015] techsutram (2013) comparing routing and routed protocols [Online]. Available at: http://www.techsutram.com/2009/10/differences-routing-vs-routed-protocol.html [Accessed on 10th of December 2015] PCmag (2013) routing protocol [Online]. Available at: http://www.pcmag.com/encyclopedia_term/0,1237,t=routing+protocol&i=50648,00.a sp [Accessed on 10th of December 2015] Microsoft (2013) Link-state [Online]. Available at: http://technet.microsoft.com/en-us/library/cc940461.aspx [Accessed on 10th of December 2015] danscourses (2013) Link state [Online]. Available at: http://www.danscourses.com/CCNA-2/link-state-routing-protocols.html [Accessed on 10th of December 2015] cisco (2013) RIP [Online]. Available at: http://www.cisco.com/en/US/tech/tk365/tk554/tsd_technology_support_sub protocol_home.html [Accessed on 11th of December 2015] cisco (2013) EIGRP [Online]. Available at: http://www.cisco.com/en/US/tech/tk365/technologies_white_paper09186a0080094cb 7.shtml [Accessed on 11th of December 2015]] csl (2013) Topologies [Online]. Available at: HND in computing and System Development Page 69 Networking Technology http://www.csl.mtu.edu/cs4451/www/notes/Network%20Topologies.pdf [Accessed on 11th of December 2015] Demand Media Inc (2013) Network Interface Card [Online]. Available at: http://www.ehow.com/about_5172983_function-network-interface-card_.html [Accessed on 11th of December 2015] HND in computing and System Development Page 70