Professional Documents
Culture Documents
Networking
D/615/1619
Submitted To
Section: I
Session: 2020
When submitting evidence for assessment, each student must sign a declaration confirming that
the work is their own.
Plagiarism
Plagiarism is a particular form of cheating. Plagiarism must be avoided at all costs and students
who break the rules, however innocently, may be penalized. It is your responsibility to ensure
that you understand correct referencing practices. As a university level student, you are expected
to use appropriate references throughout and keep carefully detailed notes of all your sources of
materials for material you have used in your work, including any material downloaded from the
Internet. Please consult the relevant unit lecturer or your course tutor if you need any further
advice.
Student Declaration
I certify that the assignment submission is entirely my own work and I fully understand
the consequences of plagiarism. I understand that making a false declaration is a form of
malpractice.
Computer networks have become the essence of our daily lives. Computer networks are the driving
force behind the evolution of computer systems allowing users to access data, hardware and services
regardless of their location. The major purpose of this assignment is to provide the students an
opportunity to exhibit their knowledge in the field of computer networking, how the network operates,
protocols, standards, security considerations and the prototypes associated with a range of networking
technologies.
The assignment will help the students to check their knowledge for configuring and installation of
networking system exploring the range of technologies and troubleshooting the network. The student
will be able to demonstrate their skills and understandings over the operation of IP data networks,
router, switching technologies, IP routing technologies, IP services and troubleshooting through the
completion of this assignment.
Besides technical stuffs, the students will be demonstrating their skills such as communication literacy,
critical thinking, analysis, reasoning and interpretation, which are crucial for gaining employment and
developing academic competence.
The completion of this assignment will illustrate that the student has been able to:
There are two parts based on the scenario. You are required to contextualize the task as per the given
scenario wherever possible.
Each student has to submit their assignment as guided in the assignment brief. The students are guided
what sort of information is to be produced to meet the targeted criteria. All the tasks need to be done
individually and the student has to produce an individual assignment.
Each student has to submit their assignment as guided in the assignment brief. The students are guided
what sort of information is to produce to meet the criteria targeted. Some tasks might require group
work, but the student has to produce individual assignment.
Scenario I
A newly IT company named LANDMARK IT Pvt. Ltd is going to be opened in Nepal. The head
office will be located in KTM, Tilganga & will have 20 branch offices over the country. It will
provide different IT related services for different types of organization like School, Bank, Colleges,
INGO, NGO etc. Some of the main services can be listed as follows:
1. Sales and maintenance of different types of computers and related devices.
2. Peer -to- peer & client server network setup.
3. Annual maintenance contract
4. Configuration of different server services like DC, RODC, CDC, DHCP, DNS, IIS, Web,
Proxy, Telnet, RADIUS, Authentication etc.
5. Configuration of routers and Switches of different vendors like Cisco, Juniper, Mikrotiketc
6. Configuration of firewalls of different vendors like Cisco, Juniper, Fortigate etc.
7. Maintenance, upgrade & troubleshooting of different network systems.
You have been hired as a network/ system administrator of this company to plan design implement
and manage the entire network systems considering IP addressing, server system, network devices,
security devices & other miscellaneous IT related services.
Part 1
You will need to produce a report for the CEO that includes the following:
Part 2
This part of the assignment will contain the following based on the tasks in section 1 and section 2.
1. Prepare a written step-by-step plan of how you are going to design a Local Area Network
including a blueprint of your LAN.
2. Justify your choice of devices for your network design.
3. Produce a test plan to evaluate this design for the requirements of bandwidth and cost
constraints as per user specifications.
4. Justify the security requirements and quality of services needed for selection of accessories.
5. Suggest a maintenance schedule to support the networked system.
Note: Please access HN Global for additional resources support and reading for this unit. For further
guidance and support on report writing please refer to the Study Skills Unit on HN Global. Link to
www.highernationals.com
Other Recommendations:
I declare that all the work submitted for this assignment is my own work or, in the case of group work,
the work of myself and the other members of the group in which I worked, and that no part of it has
been copied from any source. I understand that if any part of the work submitted for this assignment
is found to be plagiarized, none of the work submitted will be allowed to count towards the assessment
of the assignment.
Aashish Batajoo
Table of Contents
Introduction: ........................................................................................................................... 6
Cloud .................................................................................................................................. 7
Cluster ................................................................................................................................ 8
Virtualized Network........................................................................................................... 9
Constraints: - .................................................................................................................... 10
Star Topology................................................................................................................... 11
Hub................................................................................................................................... 17
Switch .............................................................................................................................. 17
Router............................................................................................................................... 17
Firewall ............................................................................................................................ 17
Repeaters .......................................................................................................................... 17
Modem ............................................................................................................................. 18
Identify the topology protocol for efficient networking on given scenario ......................... 21
Conclusion............................................................................................................................ 21
Task 2 ....................................................................................................................................... 22
Introduction .......................................................................................................................... 22
Test & Evaluation of the design to meet the requirements and user analysis feedback ...... 27
Network Design.................................................................................................................... 89
Recommendations: ............................................................................................................... 90
Conclusion ............................................................................................................................... 91
Bibliography ............................................................................................................................ 92
Task 1
LO1 Examine networking principles and their protocols.
You will need to produce a report for the CEO that includes the following:
Introduction:
Interconnection of more than one computer for sharing hardware and software is called
Computer Network & the physical arrangement of the network is known as Topology. There
are different types of network with different standards. Each type needs hardware devices and
software to perform any task so given. All the networks like client – server needs different
types
of server as well. Along with hardware and software’s, Network has to use some languages for
communication by following some certain rules & regulations which is known as Network
Protocols.
A peer-to-peer (P2P) network is created when two or more PCs are connected and share
resources without going through a separate server computer. Instead of having a central server
to act as a shared drive, each computer acts as the server for the files stored upon it. Each device
is equal to the others, and each device has the same rights and duties as the others. (Agasi,
2018)
Benefits: -
If the network is large then file transfer is faster as it downloads file from different location
simultaneously. It is cheap to install. Adding new network is very easy as it doesn’t have central
server. Even if one peer is shut down, other peers can continue to work. (Neagu, 2017)
Constraints: -
No centralized server is available to manage and control the access of data. Users have to use
separate passwords on each computer in the network. Backup has to be performed on each
computer separately. (Verma, 2018)
The client-server model is centralized networking where a server manages most processes and
stores all data. A client requests specified data or processes. The server relays process output
to the client. (Agasi, 2018)
Benefits: -
It is a centralized network where server helps in administering the whole set-up. All files are
stored in same place so management of files becomes easy. When new information is added,
all the changes are made only in central computer on which server database exists so every
client doesn’t need their storage to be increased.
Constraints: -
Too many requests from the clients may lead to overload of server network which may further
lead to breaking down of server. If the server fails then the whole network goes down. It is very
costly to install with IT specialist required to further manage it.
Cloud
A cloud server is a logical server that is built, hosted and delivered through a cloud computing
platform over the Internet. Cloud servers possess and exhibit similar capabilities and
functionality to a typical server but are accessed remotely from a cloud service provider.
(Agasi, 2018)
Benefits: -
With cloud computing users can obtain the resources themselves and they can immediately
start using it. Resources like storage, networks and many other resources are infinitely scalable.
They can be accessed from anywhere in the world and they can also be provided from anywhere
in the world.
Constraints: -
As cloud provides the managed services, we cannot control them 100%. It might be possible
that over a time we started using some native services from the cloud service provider, it will
be difficult for us to migrate from them. Due to its publicly & easily accessible nature, we have
to take extra care while security controls implementations.
Cluster
A computer cluster is a single logical unit consisting of multiple computers that are linked
through a LAN. The networked computers essentially act as a single, much more powerful
machine. (Agasi, 2018)
Benefits: -
A computer cluster provides much faster processing speed, larger storage capacity, better data
integrity, superior reliability and wider availability of resources. Computer clusters can be
upgraded to enhance the existing specifications or add extra components to the system. (Agasi,
2018)
Constraints: -
It is much more costly to implement and maintain which results in much higher running
overhead compared to a single computer. Since clustering needs more servers and hardware to
establish one, monitoring and maintenance is hard. Thus, increase the infrastructure. (Ambekar,
2018)
Centralized Network
Centralized computing is similar to a client/server architecture where one or more client PCs
are directly connected to a central server. Typically, each client PC is a thin client with no or
very limited computing capacity. (Agasi, 2018)
Benefits: -
It helps in reducing the cost because it will not emphasize on more hardware and machines. It
provides better data security. Processing is consistent on this system.
Constraints: -
Large amount of data storage is required on this system. High traffic can cause Input/output
bottleneck. Ability to respond to the information request in timely manner gets reduced. Needs
a high cost in transmitting transaction.
Virtualized Network
It refers to the management and monitoring of an entire computer network as a single
administrative entity from a single software-based administrator’s console. Network
virtualization also may include storage virtualization, which involves managing all storage as
a single resource. (Agasi, 2018)
Benefits: -
It is cheaper. It keeps costs predictable. It reduces the workload. As long as there is at least one
point of access to the virtual environment, it can be spread to the rest of the organization.
Because there aren’t local hardware or software options being utilized, energy consumption
rates can be lowered.
Constraints: -
Not every application or server is going to work within an environment of virtualization. There
is a chance of experiencing a data breach while using virtualization. You lose that full control
of what you can do because several links must work together to perform the same task.
OSI Model
This layered model is a conceptualized view of how one system should communicate with the
other, using various protocols defined in each layer. It consists of 7 layers where Physical layer
converts data into electrical bits (0&1). Data link layer synchronizes the links and transfer error
free data. Network layer defines the route for the signal through different channels. Transport
layer transport the data as a small unit through nodes to nodes while defining path as well.
Session layer synchronizes the data to make sure full data is received by receiver. Presentation
layer works as a bridge between two different communication systems. Lastly, Application
layer does the main task of sending or receiving data through mails or other services.
Benefits: -
It divides the network transferring process into smaller and simple components, facilitating
component development, design, and troubleshooting. It allows various types of network
hardware and software to communicate. It prevents changes in one OSI layer from affecting
other layers to accelerate development.
Constraints: -
Harder for other applications to use the same code for the session. Without clear separation,
combining different layers’ functionality can lead to the code being overly tied together, and
too complex, and thus harder to maintain.
TCP/IP Model
TCP/IP is responsible for full-fledged data connectivity and transmitting the data end to end by
providing other functions, including addressing, mapping and acknowledgment. TCP/IP
contains four layers, which differ slightly from the OSI model. Transport and Internet layers
correspond to the same peer layers. All three top layers of OSI Model are compressed together
in single Application layer of TCP/IP Model. (Agasi, 2018)
Benefits: -
Constraints: -
It is complex to set up & manage. Internetwork Packet Exchange (IPX) is faster than TCP/IP
model. The computation time, memory, bandwidth, etc. of TCP/IP is higher-than Internetwork
Packet Exchange (IPX).
Bus Topology
A bus topology is a network setup in which each computer and network device are connected
to a single cable or backbone.
Impact
It's the easiest network topology for connecting computers. It works well when you have a small
network due to its linear nature. If a main cable is damaged, the network fails. When you add new
devices, the network becomes slower and slower due to data collision.
On a bus topology only one computer can send data on the bus at any one time. All nodes on a bus
have to contend with each other to be able to send messages and sometimes collisions will occur on
this type of network. The data travels in both the directions along the bus. When the destination
terminal sees the data, it copies it to the local disk. It has only 10Mbps data transfer rate. (Agasi, 2018)
Star Topology
Star topology is a type of network setup where every node connects to a central network device like
Switch, Hub or Router where central network device acts as a server and the peripheral devices act as
clients.
Impact
Centralized management of the network through the use of the central computer, hub or switch. If one
computer on the network fails, the rest of the network continues to function normally. May have a
higher cost to implement especially when using a switch or router as the central network device. If the
central computer, hub, or switch fails, the entire network goes down and all computers are
disconnected from the network.
11
Samir K.C. (HND / First Semester)
Networking 2020
A data signal from any station goes directly to the central device which transmits the signal according
to the established network access method for the type of network. It can transfer
100Mbps data using coaxial cable and up to 1Gbps using Ethernet cable. (Agasi, 2018)
Mesh Topology
A network setup where each computer and network device are interconnected with one another,
allowing for most transmissions to be distributed even if one of the connections goes down.
Impact
A failure of one device does not cause a break in the network or transmission of data. Manages high
amounts of traffic, because multiple devices can transmit data simultaneously. The cost to implement
is higher than other network topologies, making it a less desirable option. Building and maintaining
the topology is difficult and time consuming because it needs to be connected to all the devices within
a network.
Network topology in which a device transmits its own data as well as serves as a relay for other nodes.
Each device is connected to all its counterparts allowing it to exchange data with one another with
their own connection line. Its data transfer rate varies from the cable used and have 100Mbps to 1Gbps
data transfer rate. (Agasi, 2018)
Ring Topology
A ring topology is a network configuration in which device connections create a circular data path.
Each networked device is connected to two others, like points on a circle.
Impact
All data flows in one direction, reducing the chance of packet collisions. Additional workstations can
be added without impacting performance of the network. The entire network will be impacted if one
device shuts down. All data being transferred over the network must pass through each device on the
network, which can make it slower.
When a terminal has to send data, it transmits it to the neighboring node which transmits it to the next
one. Before further transmission data may be amplified. In this way, data reverses the network and
reaches the destination node, which removes it from the network. If the data reaches the sender, it
removes the data and resends it later. It had 16Mbps data transfer rate in older version and has 1Gbps
in new token ring. (Agasi, 2018)
Hybrid Topology
A hybrid topology is a type of network topology that uses two or more differing network topologies.
Impact
It is more effective as it uses multiple topologies. It contains the best and efficient features of the
combined topologies from which it is constructed. It is relatively more complex than the other
topologies. It is difficult to install and configure.
All hybrid topologies have a single transmission path between any two nodes where each node defines
a topology. In this topology data is transferred through a single transmission line where two topologies
communicate according to their own network. It has data transfer rate up to 300Mbps per node. (Agasi,
2018)
Summary:
TCP/IP is a client-server model, i.e., when the client requests for service it is provided by the server.
Whereas, OSI is a conceptual model. TCP/IP is a standard protocol used for every network including
the Internet, whereas, OSI is not a protocol but a reference model used for understanding and designing
the system architecture. TCP/IP is a four layered model, whereas, OSI has seven layers. TCP/IP is
Tangible, whereas, OSI is not. TCP/IP follows top to bottom approach, whereas, OSI Model follows
a bottom-up approach.
HTTP is a set of standards that allow users of the World Wide Web to exchange information found on
web pages. When accessing any web page entering http:// in front of the address tells the browser to
communicate over HTTP.
FTP
File Transfer Protocol (FTP) is a client/server protocol used for transferring files to or exchanging files
with a host computer. It may be authenticated with user names and passwords. Anonymous FTP allows
users to access files, programs and other data from the Internet without the need for a user ID or
password. (Rose, 2007)
SMTP
SMTP is one of the most common and popular protocols for email communication over the Internet
and it provides intermediary network services between the remote email provider or organizational
email server and the local user accessing it. (Rose, 2007)
POP3
POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving email.
POP3 is a client/server protocol in which e-mail is received and held for you by your Internet server.
Periodically, you check your mail-box on the server and download any mail, probably using POP3.
(Rose, 2007)
SSL
Secure Sockets Layer (SSL) is a standard protocol used for the secure transmission of documents over
a network. Developed by Netscape, SSL technology creates a secure link between a Web server and
browser to ensure private and integral data transmission. (Agasi, 2018)
Hub
A hub is an unintelligent network device that sends one signal to all station connected to it. A hub
sends data packets to all devices on a network, regardless of any MAC addresses contained in the data
packet. Traditionally, hub is used for star topology network. (Agasi, 2018)
Switch
A switch is a high-speed device that receives incoming data packets and redirects them to their
destination on a local area network (LAN). It creates an electronic tunnel between source and
destination ports for a split second that no other traffic can enter. This results in communication without
collisions.
Router
A router is a device that analyzes the contents of data packets transmitted within a network or to another
network. Routers determine whether the source and destination are on the same network or whether
data must be transferred from one network type to another, which requires encapsulating the data
packet with routing protocol header information for the new network type.
Firewall
Firewall is a network device that isolates organization’s internal network from larger outside
network/Internet. It can be hardware, software, or combined system that prevents unauthorized access
to or from internal network. All data packets entering or leaving the internal network pass through the
firewall, which examines each packet and blocks those that do not meet the specified security criteria.
Repeaters
A repeater is a network device that retransmits a received signal with more power and to an extended
geographical or topological network boundary than what would be capable with the original signal. A
repeater is implemented in computer networks to expand the coverage area of the network, repropagate
a weak or broken signal. Repeaters amplify the received signal to a higher frequency domain so that it
Modem
A modem is a network device that both modulates and demodulates analog carrier signals for encoding
and decoding digital information for processing. Modems accomplish both of these tasks
simultaneously and, for this reason, the term modem is a combination of "modulate" and "demodulate."
VPN Concentrator
A VPN concentrator is a type of networking device that provides secure creation of VPN connections
and delivery of messages between VPN nodes. It is a type of router device, built specifically for
creating and managing VPN communication infrastructures.
Workstation
A general-purpose computer designed to be used by one person at a time and which offers higher
performance than normally found in a personal computer, especially with respect to graphics,
processing power and the ability to carry out several tasks at the same time. It contains hardware such
as network card, cabling, system bus, memory, processor, I/O devices, etc.
Networking Software
Network software encompasses a broad range of software used for design, implementation, and
operation and monitoring of computer networks. In using network software, the size and scope of a
network plays a key role in decision making. Companies or other parties can choose specific network
software tools for setup and installation. It contains software like client software, server software, client
OS, server OS, firewall, etc.
Interdependence
We can say the hardware and software are the heart and soul of a computer. Hardware is the basic
building blocks and the physical part of a computer system whereas software is a set of programs
which is used to combine and run the different hardware devices of a computer. When there are no
proper instructions given, the hardware cannot be used and is useless. To get a selected job done on
the pc, the relevant software package has to be loaded into the hardware. The software acts as an
associate interface between the user and therefore the hardware. Same hardware can be loaded with
different software to make a computer perform different types of jobs just as different songs can be
played using the same cassette player. Except for upgrades (like increasing main memory and hard
disk capacities, or adding speakers, modems, etc.); hardware is normally a one- time expense, whereas
software is a continuing expense. Like we buy new cassettes for newly released songs, we buy, new
software to be run on the same hardware as and when need arises, or funds become available.
From the above the server types, I have selected Dell PowerEdge T640 Tower server as a server
computer in this bank because of its efficient price with wide variety of support. It has high storage
capability with expandable support as well as 32GB RDIMM, 2666MT/s, Dual Rank and Up to two
Intel® Xeon® Scalable processors, up to 28 cores per processor for high speed and better performance.
It also has 8 MB cache memory which further boosts the performance of the server. So, it is the ideal
server computer for this network.
Conclusion
I have selected star topology on WAN and LAN in my network to meet the requirements according to
the given scenario. Networking devices like router, switch, and firewall and server computer are used
for better communication and security. I have also used variety of server to make this network highly
flexible, easy to use & access, highly secure and easy troubleshooting. Using different types of
protocol, it is now possible to share files and information with high security. I have also used server
computer to maintain, manage and compute variety of works with high speed and high data volume.
Task 2
LO3 Design efficient networked systems.
This part of the assignment will contain the following based on the tasks in section 1 and section
2.
Introduction
After the design and implementation of the network system, it should be properly analyzed, tested &
audited from time to time for certain duration of time. The design of the network should fulfill the
requirements of the organization. It should be suitable, easy to understand & implement and manage
& maintain by users. According to the changes on the banking system & network system, the
implemented system should be upgraded, modified, changed, maintained, etc.
A domain controller is the centerpiece of the Windows Active Directory service. It authenticates users,
stores user account information and enforces security policy for a Windows domain. We have used
DC to centralize the network, to create, manage users & networks and to create & manage different
types of security policies.
DHCP server
DHCP is an automated method by which any newly added or transferred node in a network can be
assigned or reassigned an IP address instantly. It is used to provide dynamic IP to the client computers.
RRAS server
Routing and remote access service (RRAS) is a suite of network services in the Windows Server family
that enables a server to perform the services of a conventional router. RRAS provides a remote user
with access to an internal network via a secured virtual private network (VPN) connection. This
connectivity can be deployed using typical IP-based VPN over the Internet.
VPN server
A VPN server is a type of server that enables hosting and delivery of VPN services. The VPN server
provides VPN connection and services to remote and/or local VPN clients. It is mainly used for
security in our network system.
IIS server
Internet Information Services (IIS), formerly known as Internet Information Server, is a web server
produced by Microsoft. It is used to register website for the bank.
WDS server
Windows Deployment Services is a server role that gives administrators the ability to deploy Windows
operating systems remotely. It is used to install windows OS on client computers through the single
install file on the central computer through admin privilege.
FTP server
An FTP server is a computer which has a file transfer protocol (FTP) address and is dedicated to
receiving an FTP connection. It is used in exchanging of files over internet.
Print server
A print server is a computer that can process print-related jobs on a network of computers. It is used
because it usually allows users in a computer network to perform a printing job without having to
move files to the computer connected directly to the printer.
Firewall
Firewall is a network device that isolates organization’s internal network from larger outside
network/Internet. It can be hardware, software, or combined system that prevents unauthorized access
to or from internal network. All data packets entering or leaving the internal network pass through the
firewall, which examines each packet and blocks those that do not meet the specified security criteria.
Switch
A switch is a high-speed device that receives incoming data packets and redirects them to their
destination on a local area network (LAN). It creates an electronic tunnel between source and
destination ports for a split second that no other traffic can enter. This results in communication without
collisions.
Access Point
An access point connects users to other users within the network and also can serve as the point of
interconnection between the WLAN and a fixed wire network.
Cable
We have used twisted pair cable in our network to prevent the loss of data when transferring from one
computer to another.
1 Satellite Disk
1 Cloud
14 Server
2 Firewall
2 Switch
2 Router
2 Printer
8 FTP 192.168.100.8/24
9 Print 192.168.100.9/24
Test & Evaluation of the design to meet the requirements and user analysis feedback
6 2020-04- Print server After the configuration of After the configuration of print
02 print server we should get server we were able to get access
access to the printer from to the printer from any computer
any computer within our within our network.
network.
7 2020-04- FTP server After the configuration of After the configuration of FTP
02 FTP server, we should be server, we were able to exchange
able to exchange the files the files over the internet.
over the internet.
User Feedback
Project Title: Testing and evaluating the design to meet the requirement
Manager
I have used star topology to minimize the network collapse when any of the devices in the network
stops functioning. I have used DC to centralize the network to restrict the amount of data that can be
accessed by an employee. Switch is used to create a connection with different servers and computers.
Router is used to connect the two different branches so that even if the IP address of the two branches
is different, they can still form a network. Firewall is placed to secure the network from unauthorized
access or incomplete data to enter the network. VPN server is used to secure the transfer of data through
data tunneling and encryption. Print server is used in the network so that every client can access the
number of printers available in the network to decrease the number of printers required thus saving
some cash. WDS server is used so that every computer can access the OS installation file and install
them when required with the administrator privilege. DHCP server is used to provide dynamic IP to
client computers. RODC is used to backup the data so that even when the entire network collapses,
there is no loss of data and can be recovered from RODC.
Checklists:
S.N. Question Yes No Comment
1 Have system requirements been defined & ✓ All the requirements are clear
are they clear? & defined
2 Is the system working properly? ✓ All the system is working
smoothly.
3 Can the system be modified and upgraded ✓ The system can be modified
with future change in network systems? and upgraded in future.
4 Are there any security flaws on design? ✓ There aren’t any security
flaws in the design.
After testing all the system, we have found that there are no errors whatsoever in the entire network.
All the system is working smoothly. Data are backed-up so there is no problem even when system
collapses. We can also add or remove devices without interfering with the entire network. Network is
simple and easy to troubleshoot. Entire network was created within the budget so given. Network is
made highly secured through the use of Router, Firewall and VPN.
We search for all possible loopholes in security and viruses in our network computers
• We can use Linux server instead of windows server as Linux server provides higher level of
security than windows server with auto-detect & auto-delete of virus security.
• We can use server computer with higher configuration to maximize the performance of the
network.
• We can use new versions of routers because it has new features and updated functions.
• We can use local network with higher bandwidth for faster transfer of data.
• We can use biometrics security in server room to enhance the protection of critical files.
• We can audit the entire network on regular basis monthly as well as vulnerabilities testing and
penetrating testing on some point.
• We can use genuine OS rather than pirated OS because it has much more features.
Above all, it also has built-in high-level security with fewer instances of errors.
Static IP address:
A static IP address is a permanent number assigned to a computer by an Internet service provider (ISP).
Static IP addresses are useful for gaming, website hosting or Voice over Internet Protocol (VoIP)
services. Speed and reliability are key advantages. Because a static address is constant, systems with
static IP addresses are vulnerable to data mining and increased security risks.
1. Server OS
2. Static IP
3. Strong administrative password
3. Select installation type and click next 4. Select destination server and click next
11. After installation completes, server 12. Click Promote this server to Domain
restarts automatically Controller on notification
13. Choose Add a New Forest then type root 14. Type DRSM password and Click Next
domain name and click Next
21. Press Tools on server manager the select 22. Create User then Right click on user and
Active Directory Users and Computers select properties
23. Click on Logon Hours in Account 24. Provide logon hours to user and click ok
Tab
A DNS server is a computer server that contains a database of public IP addresses and their associated
hostnames and in most cases serves to resolve, or translate, those names to IP addresses as requested.
1. Server OS
2. Static IP
3. DNS server services
3. Select installation type and click next 4. Select destination server and click next
9. After Installation finishes click Close 10. Click Tools on server manager then select
DNS
11. Right click on Forward lookup zone then 12. Click Next
select New Zone
13. Select primary zone and click Next 14. Select to all servers running on domain
controllers in this domain then click Next
15. Give Zone name and Click Next 16. Click Next
17. Verify and click Finish 18. Right click Reverse Lookup zone and select new
zone
23. Verify and click Finish 24. To add IP address, Go to IPv4 property of
network interface
25. Add IP address on DNS name and click 26. Right click on newly created forward look up
add button zone and select New Host (A or AAA)
27. Enter domain name and enter IP address 28. Click OK on Successful Message Box
then check both options and click add
host button
29. View on DNS manager 30. Check DNS using nslookup command using
CMD prompt.
Internet Information Services (IIS), formerly known as Internet Information Server, is a web server
produced by Microsoft. It is used to provide IP address for website using DNS.
3. Select installation type and click next 4. Select destination server and click next
11. Go to IIS server manager then right click on 12. Enter site name, specify content directory and
Sites and select add website select IP address of the website and click
OK
13.Delete all default document and enter your 14.Enable directory browsing
website document
DHCP assigns dynamic IP addresses to client computers that connect to it in order for those clients to
become part of the network.
1. Server OS
2. DHCP server services
Steps to Configure DHCP server:
1. Open server manager then select manage and 2. Click Next After verifying tasks and
click on add roles and features requirements.
13.Select DHCP on tool tab on server manager 14.Right click on computer name and select
authorize.
Print Server
Print servers are connected to a computer network in order to serve the need for printing jobs in a
network that may contain more than one printer.
1. Printer
2. Server OS
3. Print server services
Steps to configure Print server:
1. Open server manager then select manage and 2. Click Next After verifying tasks and
click on add roles and features requirements.
3. Select installation type and click next 4. Select destination server and click next
15.Right click on printers and select add printer 16.Select add a new printer using existing port
then click Next
17.Select install a new driver and click Next 18.Select manufacturer and click Next
19.Enter printer name and click Next 20.Verify and click Next
computer
23.Right click on printer and select connect option 24.Check whether printer is connected or not by
going to Printer and Fax
A virtual private network (VPN) is a private network that is built over a public infrastructure. Security
mechanisms, such as encryption, allow VPN users to securely access a network from different
locations via a public telecommunications network, most frequently the Internet.
1. Open server manager then select manage and 2. Click Next After verifying tasks and
click on add roles and features requirements.
3. Select installation type and click next 4. Select destination server and click next
11.Click Close after installation finishes 12.Select Routing and Remote Access
15.Select remote access and click Next 16.Select VPN and click Next
21. To create VPN connection with client write 22. Click Create a new connection
ncpa.cpl in run of client computer and click OK
25.Select virtual private network connection and 26.Write NBL as connection name and click
click Next Next
29.Select allow access in dial-in tab of the user 30.Write your login name and password then
click connect
1. Server OS
2. Static IP
3. Primary Domain Controller
4. Active Directory Domain Services Steps to Configure RODC:
1. Open server manager then select manage 2. Click Next After verifying tasks and
and click on add roles and features requirements.
3. Select installation type and click next 4. Select destination server and click next
11.Select add a domain controller to an 12.Enter domain name and password then click
existing domain and click select OK
1. Open server manager then select manage 2. Click Next After verifying tasks and
and click on add roles and features requirements.
3. Select installation type and click next 4. Select destination server and click next
11.Select add a new domain to an existing 12.Add domain name and password then click
forest then click select ok
21.Check CDC
A DHCP relay agent is any host that forwards DHCP packets between clients and servers. Relay
agents are used to forward requests and replies between clients and servers when they are not on the
same physical subnet.
3. Select installation type and click next 4. Select destination server and click next
7.Click Next 8.Select Direct Access & VPN and routing then
select Next
11.Click close after installation finishes 12.select routing and remote access in tools
15.Select Custom configuration and click 16.Select LAN routing and click Next
Next
19.Right click on General and select New 20.Select DHCP relay agent and press OK
Routing Protocol
21.Right click on DHCP relay agent and 22.Add both Ethernets as well as Internal and click
select new interface Ok
Windows Deployment Services is a server role that gives administrators the ability to deploy Windows
operating systems remotely.
3. Select installation type and click next 4. Select destination server and click next
click Next
11.Select Windows Deployment Services in 12.Right click on computer name and select
Tools configure server
19.Right click on Install Image then select Add 20.Add image location and click Next
Image file ten select Next
to backup the data but cannot backup the data but couldn’t
modify it. modify it.
Network Design
In my network, I have used Star topology as a communication medium while I have also centralized
the data and control by Configuring Domain controller in the server computer. I have also used RODC
to replicate the data so that in case of errors we can still retrieve data. I have used Routers in each of
the branches along with firewall with them to construct a communication between two networks and
secure the connection. I have also used VPN to secure the data transferred through data tunneling. I
have used CDC for branch offices to load the balance and minimized the chance of server collapse. I
have used print server to connect computers to the printer so that the employees can access the number
of printers without needing individually. I have also used WDS server so that OS can be accessed from
any computer in the network and install it.
As for the negative aspect on this network, even though the data is secured by various layers of security,
there can still be hardware damages. If the central device is broken then the entire network will
collapse. Since it is a centralized network, if somehow anyone managed to hack the central device then
they get access to all the available data and information.
Recommendations:
We can use firewall in all branches to enhance the security. We can use Linux server instead of
windows server as Linux server provides higher level of security than windows server with autodetect
& auto-delete of virus security. We can use server computer with higher configuration to maximize
the performance of the network. We can use new versions of routers because it has new features and
updated functions. We can use local network with higher bandwidth for faster transfer of data. We can
use biometrics security in server room to enhance the protection of critical files. We can audit the
entire network on regular basis monthly as well as vulnerabilities testing and penetrating testing on
some point. We can use genuine OS rather than pirated OS because it has much more features. Above
all, it also has built-in high-level security with fewer instances of errors. We can use branded computers
for better performance.
Conclusion
The system has been properly tested and analyzed with positive result. I have also created maintenance
schedule which can be helpful in future management of network. User feedback on the network was
highly rated. The design of the network fulfills the requirement of the organization. It is also easy to
understand, implement, manage and maintain by the user. The information can be passed to branch
offices from head offices securely through the installed VPN server. In this way, as a network
administrator of Landmark IT network system, I managed to install all the server that helps to
automatically assign IP, secure files, etc.
Bibliography
Agasi, O., 2018. Techopedia. [Online]
Available at: http://www.techopedia.com
[Accessed 25 April 2020].