You are on page 1of 105

International School of

Management and Technology


Tinkune, Kathmandu, Nepal

Landmark IT Network System

Networking
D/615/1619

Submitted To

Teacher Name: Ashish Batajoo


Submitted By

Name: Samir K.C.

Section: I

Session: 2020

Program Title: BTEC HND in Computing

Date of Submission: 14 February 2021


STUDENT ASSESSMENT SUBMISSION AND
DECLARATION

When submitting evidence for assessment, each student must sign a declaration confirming that
the work is their own.

Student Name Samir K.C. Assessor Name Ashish Batajoo

Issue Date 18 March 2020 Submission Date 14 Feb 2021

Programme BTEC HND in Computing

Unit Name Networking

Assignment Title Landmark IT Network System

Plagiarism

Plagiarism is a particular form of cheating. Plagiarism must be avoided at all costs and students
who break the rules, however innocently, may be penalized. It is your responsibility to ensure
that you understand correct referencing practices. As a university level student, you are expected
to use appropriate references throughout and keep carefully detailed notes of all your sources of
materials for material you have used in your work, including any material downloaded from the
Internet. Please consult the relevant unit lecturer or your course tutor if you need any further
advice.

Student Declaration

I certify that the assignment submission is entirely my own work and I fully understand
the consequences of plagiarism. I understand that making a false declaration is a form of
malpractice.

Student signature: Date:

Pearson Education 2018


Student signature: Date:
Higher Education Qualifications
SUMMATIVE ASSIGNMENT FEEDBACK FORM

Student Name/ID Samir K.C.


Unit Title Networking
Assignment Number 01 Assessor Ashish Batajoo
Submission Date 14 Feb 2021 Date Received
1st Submission
Re-submission Date Date Received
2nd Submission

Assessor Feedback Date

Grade Achieved Assessor Signature:


* Please note that grade decisions are provisional. They are only confirmed once internal and external
moderation has taken place and grades decisions have been agreed at the assessment board.
FORMATIVE ASSIGNMENT FEEDBACK FORM

Student Name/ID Samir K.C.


Unit Title Networking
Assignment Number 01 Assessor Ashish Batajoo

Assessor Feedback Date

Grade Achieved Assessor Signature:


* Please note that grade decisions are provisional. They are only confirmed once internal and external
moderation has taken place and grades decisions have been agreed at the assessment board.
INTERNATIONAL SCHOOL OF MANAGEMENT AND TECHNOLOGY
GAIRIGAUN, TINKUNE, KATHMANDU
NEPAL

BTEC HND in Computing

Unit 1: Networking Unit Code: D/615/1619

Year: 2020 Assessment No: 01

Assignment Launch Date: 18 March 2020 Due Date: 18 May 2020

Assignment Title: Landmark IT Network System

Teacher Name: Ashish Batajoo Iv’s Name:

Student Name: Samir K.C. Pearson Reg No:


Final Grade:

Purpose of this assignment

Computer networks have become the essence of our daily lives. Computer networks are the driving
force behind the evolution of computer systems allowing users to access data, hardware and services
regardless of their location. The major purpose of this assignment is to provide the students an
opportunity to exhibit their knowledge in the field of computer networking, how the network operates,
protocols, standards, security considerations and the prototypes associated with a range of networking
technologies.
The assignment will help the students to check their knowledge for configuring and installation of
networking system exploring the range of technologies and troubleshooting the network. The student
will be able to demonstrate their skills and understandings over the operation of IP data networks,
router, switching technologies, IP routing technologies, IP services and troubleshooting through the
completion of this assignment.

Besides technical stuffs, the students will be demonstrating their skills such as communication literacy,
critical thinking, analysis, reasoning and interpretation, which are crucial for gaining employment and
developing academic competence.

The completion of this assignment will illustrate that the student has been able to:

• Examine networking principles and their protocols.


• Examine networking devices and operations.
• Design efficient networked systems.
• Implement and diagnose networked system.

There are two parts based on the scenario. You are required to contextualize the task as per the given
scenario wherever possible.

Each student has to submit their assignment as guided in the assignment brief. The students are guided
what sort of information is to be produced to meet the targeted criteria. All the tasks need to be done
individually and the student has to produce an individual assignment.

Assignment submission format

Each student has to submit their assignment as guided in the assignment brief. The students are guided
what sort of information is to produce to meet the criteria targeted. Some tasks might require group
work, but the student has to produce individual assignment.

Scenario I
A newly IT company named LANDMARK IT Pvt. Ltd is going to be opened in Nepal. The head
office will be located in KTM, Tilganga & will have 20 branch offices over the country. It will
provide different IT related services for different types of organization like School, Bank, Colleges,
INGO, NGO etc. Some of the main services can be listed as follows:
1. Sales and maintenance of different types of computers and related devices.
2. Peer -to- peer & client server network setup.
3. Annual maintenance contract
4. Configuration of different server services like DC, RODC, CDC, DHCP, DNS, IIS, Web,
Proxy, Telnet, RADIUS, Authentication etc.
5. Configuration of routers and Switches of different vendors like Cisco, Juniper, Mikrotiketc
6. Configuration of firewalls of different vendors like Cisco, Juniper, Fortigate etc.
7. Maintenance, upgrade & troubleshooting of different network systems.

You have been hired as a network/ system administrator of this company to plan design implement
and manage the entire network systems considering IP addressing, server system, network devices,
security devices & other miscellaneous IT related services.

Part 1

LO1 Examine networking principles and their protocols.

LO2 Explain networking devices and operations.

You will need to produce a report for the CEO that includes the following:

1. An introduction to provide an overview of your report.


2. An explanation of networking principles, protocols and devices, including benefits and
constraints of networked solutions, the impact of network topology, communication and
bandwidth requirements, effectiveness of networking systems, operating principles of
networking devices and server types and networking software.

Part 2

LO3 Design efficient networked systems.

LO4 Implement and diagnose networked systems.

This part of the assignment will contain the following based on the tasks in section 1 and section 2.

• A LAN design plan and blueprint and justification document.


• A fully completed test plan including an evaluation of results and recommendations for
improvements to LAN
• A proposed and justified maintenance schedule.
• Evidence of an implemented network.

Section 1 based on the scenario above, design efficient networked systems

1. Prepare a written step-by-step plan of how you are going to design a Local Area Network
including a blueprint of your LAN.
2. Justify your choice of devices for your network design.
3. Produce a test plan to evaluate this design for the requirements of bandwidth and cost
constraints as per user specifications.
4. Justify the security requirements and quality of services needed for selection of accessories.
5. Suggest a maintenance schedule to support the networked system.

Section 2 Implement test and diagnose networked systems

1. Implement a networked system based on your prepared design.


2. Conduct verification with e.g., Ping, extended ping, trace route, telnet, SSH, etc.
3. Record the test results and analyze these against expected results.
4. Investigate what functionalities would allow the system to support device growth and the
addition of communication devices.
5. Discuss the significance of upgrades and security requirements in your recommendation.
Pass Merit Distinction
LO1Examine networking principles and their protocols

P1Discuss the benefits and M1Comparecommon networking

constraints of different network principles and how protocols

types and standards. enable effectiveness of LO1 & 2 D1 Considering a


P2Explain the impact of network networked systems. given scenario, identify the
topology protocol selected for
topology, Communication and
the efficient utilization of a
bandwidth requirements. networking system.

LO2 Explain networking devices and operations


P3 Discuss the operating M2Explore a range of server
principles of networking devices types and justify the selection of
and server types. a server, considering a given
P4 Discuss the inter- dependence scenario regarding cost and
of workstation hardware with performance optimisation.
relevant networking software.

LO3Design efficient networked systems

P5Design a networked system to M3 Install and configure network


meet a given specification. services and applications on your D2 Design a maintenance
P6Test and evaluate the design choice. schedule to support the
to meet the requirements and networked system.
analyse user feedback.
LO4 Implement and diagnose networked systems

P7Implement a networked M4 Recommend potential D3Use critical reflection to


system based on a prepared enhancements for the networked evaluate own work and justify
design. systems. valid conclusions.
P8Document and analyze test
results against expected results.

Mention all the grades awarded in this assignments:

Note: Please access HN Global for additional resources support and reading for this unit. For further
guidance and support on report writing please refer to the Study Skills Unit on HN Global. Link to
www.highernationals.com

Other Recommendations:

It should be the student’s own work – plagiarism is unacceptable.


Clarity of expression and structure are important features.
Your work should be submitted as a well presented, word-processed document with headers
and footers, and headings and subheadings, both in hard and soft copies.
You are expected to undertake research on this subject using books from the Library, and
resources available on the Internet.
Any sources of information should be listed as references at the end of your document and
these sources should be referenced within the text of your document using APA referencing
style Your report should be illustrated with screen-prints, images, tables, charts and/or
graphics.
All assignments must be typed in Times New Roman, Justified, size 12, 1½ spacing.

I declare that all the work submitted for this assignment is my own work or, in the case of group work,
the work of myself and the other members of the group in which I worked, and that no part of it has
been copied from any source. I understand that if any part of the work submitted for this assignment
is found to be plagiarized, none of the work submitted will be allowed to count towards the assessment
of the assignment.

Assignment Prepared By: Signature: Date: 14 March, 2020

Aashish Batajoo

Brief Checked By: Signature: Date: 16 March 2020

Dhruba Babu Joshi


Networking 2020

Table of Contents

Task 1…………………. ............................................................................................................ 4

Introduction: ........................................................................................................................... 6

Benefits & Constraints of different network types & standards: - ......................................... 6

Peer Based Network ........................................................................................................... 6

Client – Server Network .................................................................................................... 7

Cloud .................................................................................................................................. 7

Cluster ................................................................................................................................ 8

Centralized Network .......................................................................................................... 8

Virtualized Network........................................................................................................... 9

OSI Model .......................................................................................................................... 9

Constraints: - .................................................................................................................... 10

TCP/IP Model .................................................................................................................. 10

Impact of Network Topology, Communication & Bandwidth Requirements ..................... 10

Bus Topology ................................................................................................................... 10

Star Topology................................................................................................................... 11

Mesh Topology ................................................................................................................ 12

Ring Topology ................................................................................................................. 13

Hybrid Topology .............................................................................................................. 14

Comparison of common networking principles: .................................................................. 15

Effectiveness on network system using different protocols ................................................. 16

Operating Principles of networking devices and server types: ............................................ 17

Hub................................................................................................................................... 17

Switch .............................................................................................................................. 17

Samir K.C. (HND / First Semester) 1


Networking 2020

Router............................................................................................................................... 17

Firewall ............................................................................................................................ 17

Repeaters .......................................................................................................................... 17

Modem ............................................................................................................................. 18

VPN Concentrator ............................................................................................................ 18

Interdependence of workstation hardware with relevant networking software ................... 18

Ranges of Server Types: ...................................................................................................... 19

Identify the topology protocol for efficient networking on given scenario ......................... 21

Conclusion............................................................................................................................ 21

Task 2 ....................................................................................................................................... 22

Introduction .......................................................................................................................... 22

Design a networked system to meet a given specification ................................................... 22

Server used in network system ........................................................................................ 22

Devices used on network system ..................................................................................... 24

Test & Evaluation of the design to meet the requirements and user analysis feedback ...... 27

Maintenance schedule to support the networked system ..................................................... 30

Day 1: Server Maintenance .............................................................................................. 30

Day 2: Security Maintenance ........................................................................................... 30

Day 3: Network Device Maintenance .............................................................................. 31

Day 4: Computer Maintenance ........................................................................................ 31

Recommendation for Potential Enhancement ...................................................................... 31

Network System based on prepared design.......................................................................... 32

Static IP address: .............................................................................................................. 32

Active Directory Domain Services (Primary Domain Controller) .................................. 33

Domain Name System (DNS) .......................................................................................... 38

Internet Information Services (IIS) .................................................................................. 44

Samir K.C. (HND / First Semester) 2


Networking 2020

Dynamic Host Configuration Protocol (DHCP) .............................................................. 47

Print Server ...................................................................................................................... 53

Virtual Private Network (VPN) ....................................................................................... 58

Read Only Domain Controller (RODC) .......................................................................... 65

Child Domain Controller (CDC) ..................................................................................... 70

DHCP Flame Relay Agent ............................................................................................... 76

Windows Deployment Server (WDS) ............................................................................. 81

Document and Analyze test results against expected result ................................................. 86

Critical reflection to evaluate my work ................................................................................... 89

Network Design.................................................................................................................... 89

Test Plan of the proposed design.......................................................................................... 89

Implementation of the Design .............................................................................................. 89

Diagnosis of the implemented Network ............................................................................... 90

Positive & Negative aspect of implemented network .......................................................... 90

Recommendations: ............................................................................................................... 90

Conclusion ............................................................................................................................... 91

Bibliography ............................................................................................................................ 92

Samir K.C. (HND / First Semester) 3


Networking 2020

Task 1
LO1 Examine networking principles and their protocols.

LO2 Explain networking devices and operations.

You will need to produce a report for the CEO that includes the following:

1. An introduction to provide an overview of your report.


2. An explanation of networking principles, protocols and devices, including benefits and
constraints of networked solutions, the impact of network topology, communication and
bandwidth requirements, effectiveness of networking systems, operating principles of
networking devices and server types and networking software.

Samir K.C. (HND / First Semester) 4


Networking 2020

Report on Overview of Project

By: Samir K.C.

Samir K.C. (HND / First Semester) 5


Networking 2020

Introduction:

Interconnection of more than one computer for sharing hardware and software is called
Computer Network & the physical arrangement of the network is known as Topology. There
are different types of network with different standards. Each type needs hardware devices and
software to perform any task so given. All the networks like client – server needs different
types

of server as well. Along with hardware and software’s, Network has to use some languages for
communication by following some certain rules & regulations which is known as Network
Protocols.

Benefits & Constraints of different network types & standards: -

Peer Based Network

A peer-to-peer (P2P) network is created when two or more PCs are connected and share
resources without going through a separate server computer. Instead of having a central server
to act as a shared drive, each computer acts as the server for the files stored upon it. Each device
is equal to the others, and each device has the same rights and duties as the others. (Agasi,
2018)

Benefits: -

If the network is large then file transfer is faster as it downloads file from different location
simultaneously. It is cheap to install. Adding new network is very easy as it doesn’t have central
server. Even if one peer is shut down, other peers can continue to work. (Neagu, 2017)
Constraints: -

No centralized server is available to manage and control the access of data. Users have to use
separate passwords on each computer in the network. Backup has to be performed on each
computer separately. (Verma, 2018)

Samir K.C. (HND / First Semester) 6


Networking 2020

Client – Server Network

The client-server model is centralized networking where a server manages most processes and
stores all data. A client requests specified data or processes. The server relays process output
to the client. (Agasi, 2018)

Benefits: -
It is a centralized network where server helps in administering the whole set-up. All files are
stored in same place so management of files becomes easy. When new information is added,
all the changes are made only in central computer on which server database exists so every
client doesn’t need their storage to be increased.

Constraints: -

Too many requests from the clients may lead to overload of server network which may further
lead to breaking down of server. If the server fails then the whole network goes down. It is very
costly to install with IT specialist required to further manage it.

Cloud

A cloud server is a logical server that is built, hosted and delivered through a cloud computing
platform over the Internet. Cloud servers possess and exhibit similar capabilities and
functionality to a typical server but are accessed remotely from a cloud service provider.
(Agasi, 2018)

Benefits: -
With cloud computing users can obtain the resources themselves and they can immediately
start using it. Resources like storage, networks and many other resources are infinitely scalable.
They can be accessed from anywhere in the world and they can also be provided from anywhere
in the world.

Constraints: -

As cloud provides the managed services, we cannot control them 100%. It might be possible
that over a time we started using some native services from the cloud service provider, it will
be difficult for us to migrate from them. Due to its publicly & easily accessible nature, we have
to take extra care while security controls implementations.

Samir K.C. (HND / First Semester) 7


Networking 2020

Cluster
A computer cluster is a single logical unit consisting of multiple computers that are linked
through a LAN. The networked computers essentially act as a single, much more powerful
machine. (Agasi, 2018)

Benefits: -

A computer cluster provides much faster processing speed, larger storage capacity, better data
integrity, superior reliability and wider availability of resources. Computer clusters can be
upgraded to enhance the existing specifications or add extra components to the system. (Agasi,
2018)

Constraints: -

It is much more costly to implement and maintain which results in much higher running
overhead compared to a single computer. Since clustering needs more servers and hardware to
establish one, monitoring and maintenance is hard. Thus, increase the infrastructure. (Ambekar,
2018)

Centralized Network

Centralized computing is similar to a client/server architecture where one or more client PCs
are directly connected to a central server. Typically, each client PC is a thin client with no or
very limited computing capacity. (Agasi, 2018)

Benefits: -
It helps in reducing the cost because it will not emphasize on more hardware and machines. It
provides better data security. Processing is consistent on this system.

Constraints: -

Large amount of data storage is required on this system. High traffic can cause Input/output
bottleneck. Ability to respond to the information request in timely manner gets reduced. Needs
a high cost in transmitting transaction.

Samir K.C. (HND / First Semester) 8


Networking 2020

Virtualized Network
It refers to the management and monitoring of an entire computer network as a single
administrative entity from a single software-based administrator’s console. Network
virtualization also may include storage virtualization, which involves managing all storage as
a single resource. (Agasi, 2018)

Benefits: -
It is cheaper. It keeps costs predictable. It reduces the workload. As long as there is at least one
point of access to the virtual environment, it can be spread to the rest of the organization.

Because there aren’t local hardware or software options being utilized, energy consumption
rates can be lowered.

Constraints: -

Not every application or server is going to work within an environment of virtualization. There
is a chance of experiencing a data breach while using virtualization. You lose that full control
of what you can do because several links must work together to perform the same task.

OSI Model
This layered model is a conceptualized view of how one system should communicate with the
other, using various protocols defined in each layer. It consists of 7 layers where Physical layer
converts data into electrical bits (0&1). Data link layer synchronizes the links and transfer error
free data. Network layer defines the route for the signal through different channels. Transport
layer transport the data as a small unit through nodes to nodes while defining path as well.
Session layer synchronizes the data to make sure full data is received by receiver. Presentation
layer works as a bridge between two different communication systems. Lastly, Application
layer does the main task of sending or receiving data through mails or other services.

Benefits: -

It divides the network transferring process into smaller and simple components, facilitating
component development, design, and troubleshooting. It allows various types of network
hardware and software to communicate. It prevents changes in one OSI layer from affecting
other layers to accelerate development.

Samir K.C. (HND / First Semester) 9


Networking 2020

Constraints: -
Harder for other applications to use the same code for the session. Without clear separation,
combining different layers’ functionality can lead to the code being overly tied together, and
too complex, and thus harder to maintain.

TCP/IP Model

TCP/IP is responsible for full-fledged data connectivity and transmitting the data end to end by
providing other functions, including addressing, mapping and acknowledgment. TCP/IP
contains four layers, which differ slightly from the OSI model. Transport and Internet layers
correspond to the same peer layers. All three top layers of OSI Model are compressed together
in single Application layer of TCP/IP Model. (Agasi, 2018)

Benefits: -

It operates independently of the operating system. It has a scalable, client-server architecture.


It can be used to establish connection between different types of computers. It supports for a
number of routing-protocols.

Constraints: -

It is complex to set up & manage. Internetwork Packet Exchange (IPX) is faster than TCP/IP
model. The computation time, memory, bandwidth, etc. of TCP/IP is higher-than Internetwork
Packet Exchange (IPX).

Impact of Network Topology, Communication & Bandwidth Requirements

Bus Topology
A bus topology is a network setup in which each computer and network device are connected
to a single cable or backbone.

Samir K.C. (HND / First Semester) 10


Networking 2020

Impact

It's the easiest network topology for connecting computers. It works well when you have a small
network due to its linear nature. If a main cable is damaged, the network fails. When you add new
devices, the network becomes slower and slower due to data collision.

Fig: - Bus Topology


Communication and Bandwidth

On a bus topology only one computer can send data on the bus at any one time. All nodes on a bus
have to contend with each other to be able to send messages and sometimes collisions will occur on
this type of network. The data travels in both the directions along the bus. When the destination
terminal sees the data, it copies it to the local disk. It has only 10Mbps data transfer rate. (Agasi, 2018)

Star Topology
Star topology is a type of network setup where every node connects to a central network device like
Switch, Hub or Router where central network device acts as a server and the peripheral devices act as
clients.

Impact

Centralized management of the network through the use of the central computer, hub or switch. If one
computer on the network fails, the rest of the network continues to function normally. May have a
higher cost to implement especially when using a switch or router as the central network device. If the
central computer, hub, or switch fails, the entire network goes down and all computers are
disconnected from the network.

11
Samir K.C. (HND / First Semester)
Networking 2020

Fig: - Star Topology


Communication and Bandwidth

A data signal from any station goes directly to the central device which transmits the signal according
to the established network access method for the type of network. It can transfer

100Mbps data using coaxial cable and up to 1Gbps using Ethernet cable. (Agasi, 2018)

Mesh Topology
A network setup where each computer and network device are interconnected with one another,
allowing for most transmissions to be distributed even if one of the connections goes down.

Impact

A failure of one device does not cause a break in the network or transmission of data. Manages high
amounts of traffic, because multiple devices can transmit data simultaneously. The cost to implement
is higher than other network topologies, making it a less desirable option. Building and maintaining
the topology is difficult and time consuming because it needs to be connected to all the devices within
a network.

Samir K.C. (HND / First Semester) 12


Networking 2020

Fig: - Mesh Topology


Communication and Bandwidth

Network topology in which a device transmits its own data as well as serves as a relay for other nodes.
Each device is connected to all its counterparts allowing it to exchange data with one another with
their own connection line. Its data transfer rate varies from the cable used and have 100Mbps to 1Gbps
data transfer rate. (Agasi, 2018)

Ring Topology
A ring topology is a network configuration in which device connections create a circular data path.
Each networked device is connected to two others, like points on a circle.

Impact

All data flows in one direction, reducing the chance of packet collisions. Additional workstations can
be added without impacting performance of the network. The entire network will be impacted if one
device shuts down. All data being transferred over the network must pass through each device on the
network, which can make it slower.

Fig: - Ring Topology

Samir K.C. (HND / First Semester) 13


Networking 2020

Communication and Bandwidth

When a terminal has to send data, it transmits it to the neighboring node which transmits it to the next
one. Before further transmission data may be amplified. In this way, data reverses the network and
reaches the destination node, which removes it from the network. If the data reaches the sender, it
removes the data and resends it later. It had 16Mbps data transfer rate in older version and has 1Gbps
in new token ring. (Agasi, 2018)

Hybrid Topology
A hybrid topology is a type of network topology that uses two or more differing network topologies.

Impact

It is more effective as it uses multiple topologies. It contains the best and efficient features of the
combined topologies from which it is constructed. It is relatively more complex than the other
topologies. It is difficult to install and configure.

Fig: - Hybrid Topology


Communication and Bandwidth

All hybrid topologies have a single transmission path between any two nodes where each node defines
a topology. In this topology data is transferred through a single transmission line where two topologies
communicate according to their own network. It has data transfer rate up to 300Mbps per node. (Agasi,
2018)

Samir K.C. (HND / First Semester) 14


Networking 2020

Comparison of common networking principles:


Basis of comparison TCP/IP model OSI model

Meaning It is a client server model used for It is a theoretical model which is


transmission of data over the internet. used for computing system.

No. Of Layers 4 Layers 7 Layers

Developed by Department of Defense (DoD) ISO (International


Organization for
Standardization)
Tangible Yes No

Usage Mostly used Never used

Summary:

TCP/IP is a client-server model, i.e., when the client requests for service it is provided by the server.
Whereas, OSI is a conceptual model. TCP/IP is a standard protocol used for every network including
the Internet, whereas, OSI is not a protocol but a reference model used for understanding and designing
the system architecture. TCP/IP is a four layered model, whereas, OSI has seven layers. TCP/IP is

Samir K.C. (HND / First Semester) 15


Networking 2020

Tangible, whereas, OSI is not. TCP/IP follows top to bottom approach, whereas, OSI Model follows
a bottom-up approach.

Effectiveness on network system using different protocols


HTTP

HTTP is a set of standards that allow users of the World Wide Web to exchange information found on
web pages. When accessing any web page entering http:// in front of the address tells the browser to
communicate over HTTP.

FTP

File Transfer Protocol (FTP) is a client/server protocol used for transferring files to or exchanging files
with a host computer. It may be authenticated with user names and passwords. Anonymous FTP allows
users to access files, programs and other data from the Internet without the need for a user ID or
password. (Rose, 2007)

SMTP

SMTP is one of the most common and popular protocols for email communication over the Internet
and it provides intermediary network services between the remote email provider or organizational
email server and the local user accessing it. (Rose, 2007)

POP3

POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving email.
POP3 is a client/server protocol in which e-mail is received and held for you by your Internet server.
Periodically, you check your mail-box on the server and download any mail, probably using POP3.
(Rose, 2007)

SSL

Secure Sockets Layer (SSL) is a standard protocol used for the secure transmission of documents over
a network. Developed by Netscape, SSL technology creates a secure link between a Web server and
browser to ensure private and integral data transmission. (Agasi, 2018)

Samir K.C. (HND / First Semester) 16


Networking 2020

Operating Principles of networking devices and server types:

Hub
A hub is an unintelligent network device that sends one signal to all station connected to it. A hub
sends data packets to all devices on a network, regardless of any MAC addresses contained in the data
packet. Traditionally, hub is used for star topology network. (Agasi, 2018)

Switch
A switch is a high-speed device that receives incoming data packets and redirects them to their
destination on a local area network (LAN). It creates an electronic tunnel between source and
destination ports for a split second that no other traffic can enter. This results in communication without
collisions.

Router
A router is a device that analyzes the contents of data packets transmitted within a network or to another
network. Routers determine whether the source and destination are on the same network or whether
data must be transferred from one network type to another, which requires encapsulating the data
packet with routing protocol header information for the new network type.

Firewall

Firewall is a network device that isolates organization’s internal network from larger outside
network/Internet. It can be hardware, software, or combined system that prevents unauthorized access
to or from internal network. All data packets entering or leaving the internal network pass through the
firewall, which examines each packet and blocks those that do not meet the specified security criteria.

Repeaters
A repeater is a network device that retransmits a received signal with more power and to an extended
geographical or topological network boundary than what would be capable with the original signal. A
repeater is implemented in computer networks to expand the coverage area of the network, repropagate
a weak or broken signal. Repeaters amplify the received signal to a higher frequency domain so that it

Samir K.C. (HND / First Semester) 17


Networking 2020

is reusable, scalable and available.

Modem
A modem is a network device that both modulates and demodulates analog carrier signals for encoding
and decoding digital information for processing. Modems accomplish both of these tasks
simultaneously and, for this reason, the term modem is a combination of "modulate" and "demodulate."

VPN Concentrator
A VPN concentrator is a type of networking device that provides secure creation of VPN connections
and delivery of messages between VPN nodes. It is a type of router device, built specifically for
creating and managing VPN communication infrastructures.

Interdependence of workstation hardware with relevant networking software

Workstation
A general-purpose computer designed to be used by one person at a time and which offers higher
performance than normally found in a personal computer, especially with respect to graphics,
processing power and the ability to carry out several tasks at the same time. It contains hardware such
as network card, cabling, system bus, memory, processor, I/O devices, etc.

Networking Software

Network software encompasses a broad range of software used for design, implementation, and
operation and monitoring of computer networks. In using network software, the size and scope of a
network plays a key role in decision making. Companies or other parties can choose specific network
software tools for setup and installation. It contains software like client software, server software, client
OS, server OS, firewall, etc.

Interdependence

We can say the hardware and software are the heart and soul of a computer. Hardware is the basic
building blocks and the physical part of a computer system whereas software is a set of programs
which is used to combine and run the different hardware devices of a computer. When there are no

Samir K.C. (HND / First Semester) 18


Networking 2020

proper instructions given, the hardware cannot be used and is useless. To get a selected job done on
the pc, the relevant software package has to be loaded into the hardware. The software acts as an
associate interface between the user and therefore the hardware. Same hardware can be loaded with
different software to make a computer perform different types of jobs just as different songs can be
played using the same cassette player. Except for upgrades (like increasing main memory and hard
disk capacities, or adding speakers, modems, etc.); hardware is normally a one- time expense, whereas
software is a continuing expense. Like we buy new cassettes for newly released songs, we buy, new
software to be run on the same hardware as and when need arises, or funds become available.

Ranges of Server Types:


Specifications Dell PowerEdge T640 Lenovo Think system Acer AT350F3 Tower
Tower server ST550 Tower server Server
Processor Up to two Intel® Up to second Intel® Xeon®
Xeon® Scalable generation Intel® processors
processors, up to 28
cores per processor Xeon® Platinum
processors, up to
125W
Processor Cache 8 MB 8 MB 8 MB
Storage 480GB SSD SATA 1.2TB 10K RPM SAS 8 ports SATA3 HDD
Read Intensive 6Gbps 12Gbps 512n 2.5in with software RAID
512 2.5in Hot-plug Hot-plug Hard Drive, 0, 1, 5, 10
AG Drive,3.5in HYB 3.5in HYB CARR
CARR, 1 DWPD, 876
TBW
GPU NVIDIA Tesla P100, 1X NVIDIA NVS 310 1X NVIDIA NVS 310
P40, K80M, M60, or or
M10, AMD 1X NVIDIA Quadro 1X NVIDIA Quadro
S7150, S7150X2 P4000 P4000

Samir K.C. (HND / First Semester) 19


Networking 2020

Memory (RAM) 32GB RDIMM, Up to 768GB in 12x PCIe® 3.0 expansion


2666MT/s, Dual Rank DIMM slots using slots and up to 16
64GB DIMMs; 2666 DIMM slots
and 2933MHz
(support planned)
TruDDR4
Storage Controller PERC H730P, H740P, External HBAs HBA330, H740P,
HBA330, H330, (nonRAID): 12Gbps H330, Software RAID
Software RAID SAS (SWRAID)S140
(SWRAID) S140 HBA
Security/ Maintenance Integrated security Integrated security Integrated security
provided by dell provided by Lenovo provided by Acer

Support OS Microsoft Windows Microsoft Windows Microsoft Windows


Server® with Hyper- Server, SUSE, Red Server® with Hyper-
V Hat, VMware vSphere V
Red Hat® Enterprise
Linux
SUSE® Linux
Enterprise Server
VMware® ESXi
Network Interface 2 x 10GbE 2x 1GbE ports 2 x 1GbE LOM
LOM (1GbE/10GbE) standard
Price $3,079.00 $2,069.00 $2,040.00

From the above the server types, I have selected Dell PowerEdge T640 Tower server as a server
computer in this bank because of its efficient price with wide variety of support. It has high storage
capability with expandable support as well as 32GB RDIMM, 2666MT/s, Dual Rank and Up to two
Intel® Xeon® Scalable processors, up to 28 cores per processor for high speed and better performance.
It also has 8 MB cache memory which further boosts the performance of the server. So, it is the ideal
server computer for this network.

Samir K.C. (HND / First Semester) 20


Networking 2020

Identify the topology protocol for efficient networking on given scenario


Considering a given scenario, we have selected star topology for our network. For our network in the
bank, there will be no less than 100 computers, so we have used star topology since failure of one
computer doesn’t affect the entire network. We can also easily add or remove computers and other
hardware without need for changes in the entire network. In bank, we can’t allow all the personals to
get access to the critical data, so with the use of star topology, data is centralized with only select few
getting access to the critical data. Due to centralization, we can also limit the actual data restriction to
each and every employee on the basis of their posts. Due to centralization, the entire network is
dependent on that single central point. If the network is having problem then we can conclude the error
in central device as each link or device can be probed individually which makes it easy for
professionals to troubleshoot it easily without much loss of time and we can also secure the efficiency
of network by managing only the central device since errors in other devices doesn’t affect the entire
network. Star topology prevents unnecessary passing of the data packet through nodes. At most 3
devices and 2 links are involved in any communication between any two devices which are part of this
topology which are the sender, receiver and central device. Installation is simple, inexpensive, and fast
because of the flexible cable and the modular connector. The topology is easy to understand, establish,
and navigate.

Conclusion
I have selected star topology on WAN and LAN in my network to meet the requirements according to
the given scenario. Networking devices like router, switch, and firewall and server computer are used
for better communication and security. I have also used variety of server to make this network highly
flexible, easy to use & access, highly secure and easy troubleshooting. Using different types of
protocol, it is now possible to share files and information with high security. I have also used server
computer to maintain, manage and compute variety of works with high speed and high data volume.

Samir K.C. (HND / First Semester) 21


Networking 2020

Task 2
LO3 Design efficient networked systems.

LO4 Implement and diagnose networked systems.

This part of the assignment will contain the following based on the tasks in section 1 and section

2.

• A LAN design plan and blueprint and justification document.


• A fully completed test plan including an evaluation of results and recommendations for
improvements to LAN.
• A proposed and justified maintenance schedule.
• Evidence of an implemented network.

Introduction
After the design and implementation of the network system, it should be properly analyzed, tested &
audited from time to time for certain duration of time. The design of the network should fulfill the
requirements of the organization. It should be suitable, easy to understand & implement and manage
& maintain by users. According to the changes on the banking system & network system, the
implemented system should be upgraded, modified, changed, maintained, etc.

Design a networked system to meet a given specification

Server used in network system


Domain Controller (DC)

A domain controller is the centerpiece of the Windows Active Directory service. It authenticates users,
stores user account information and enforces security policy for a Windows domain. We have used
DC to centralize the network, to create, manage users & networks and to create & manage different
types of security policies.

Samir K.C. (HND / First Semester) 22


Networking 2020

DHCP server

DHCP is an automated method by which any newly added or transferred node in a network can be
assigned or reassigned an IP address instantly. It is used to provide dynamic IP to the client computers.

RRAS server

Routing and remote access service (RRAS) is a suite of network services in the Windows Server family
that enables a server to perform the services of a conventional router. RRAS provides a remote user
with access to an internal network via a secured virtual private network (VPN) connection. This
connectivity can be deployed using typical IP-based VPN over the Internet.

VPN server

A VPN server is a type of server that enables hosting and delivery of VPN services. The VPN server
provides VPN connection and services to remote and/or local VPN clients. It is mainly used for
security in our network system.

IIS server

Internet Information Services (IIS), formerly known as Internet Information Server, is a web server
produced by Microsoft. It is used to register website for the bank.

WDS server

Windows Deployment Services is a server role that gives administrators the ability to deploy Windows
operating systems remotely. It is used to install windows OS on client computers through the single
install file on the central computer through admin privilege.

FTP server

An FTP server is a computer which has a file transfer protocol (FTP) address and is dedicated to
receiving an FTP connection. It is used in exchanging of files over internet.

Samir K.C. (HND / First Semester) 23


Networking 2020

Print server

A print server is a computer that can process print-related jobs on a network of computers. It is used
because it usually allows users in a computer network to perform a printing job without having to
move files to the computer connected directly to the printer.

Devices used on network system


Router
A router is a device that analyzes the contents of data packets transmitted within a network or to another
network. Routers determine whether the source and destination are on the same network or whether
data must be transferred from one network type to another, which requires encapsulating the data
packet with routing protocol header information for the new network type.

Firewall
Firewall is a network device that isolates organization’s internal network from larger outside
network/Internet. It can be hardware, software, or combined system that prevents unauthorized access
to or from internal network. All data packets entering or leaving the internal network pass through the
firewall, which examines each packet and blocks those that do not meet the specified security criteria.

Switch
A switch is a high-speed device that receives incoming data packets and redirects them to their
destination on a local area network (LAN). It creates an electronic tunnel between source and
destination ports for a split second that no other traffic can enter. This results in communication without
collisions.

Access Point
An access point connects users to other users within the network and also can serve as the point of
interconnection between the WLAN and a fixed wire network.

Cable
We have used twisted pair cable in our network to prevent the loss of data when transferring from one
computer to another.

Samir K.C. (HND / First Semester) 24


Networking 2020

Samir K.C. (HND / First Semester) 25


Networking 2020

Symbol Count Description

1 Wireless Access Point

1 Satellite Disk

1 Cloud

14 Server

2 Firewall

2 Switch

2 Router

2 Printer

IP Table for Head Office

S. No. Server Name IP address/Subnet Mask


1 AD DS/PDC 192.168.100.1/24
2 DNS 192.168.100.2/24
3 DHCP 192.168.100.3/24
4 RRAS 192.168.100.4/24
5 VPN 192.168.100.5/24
6 IIS 192.168.100.6/24
7 WDS 192.168.100.7/24

8 FTP 192.168.100.8/24
9 Print 192.168.100.9/24

Samir K.C. (HND / First Semester) 26


Networking 2020

IP Address for Branch Office:

S. No. Server Name IP address/Subnet Mask


1 DNS 192.168.100.10/24
2 RRAS 192.168.100.11/24
3 VPN 192.168.100.12/24
4 CDC 192.168.100.13/24
5 WDS 192.168.100.14/24
6 Print 192.168.100.15/24

Test & Evaluation of the design to meet the requirements and user analysis feedback

S.N. Date What is Expected Output Actual output


tested?

1 2020-04- DC After the configuration of After the configuration of DC,


01 DC, we should be able to we were able to create and
create and manage users & manage users & policies.
policies.

2 2020-04- DHCP After the configuration of After the configuration of


01 DHCP server we should be DHCP server we were able to
able to provide dynamic IP provide dynamic IP to client
to client computers. computers.

3 2020-04- RODC After the configuration of After the configuration of


01 RODC we should be able RODC we were able to back up
to back up the data but the data but couldn’t modify it.
cannot modify it.

Samir K.C. (HND / First Semester) 27


Networking 2020

4 2020-04- WDS After the configuration of After the configuration of WDS


02 WDS server we should be server we were able to access
able to access the windows the windows setup file and use
setup file and use it from it from client computers to
client computers to install install windows.
windows.

5 2020-04- VPN After the configuration of After the configuration of VPN


02 VPN server our data server our data was secured
should be secured while while transferring.
transferring.

6 2020-04- Print server After the configuration of After the configuration of print
02 print server we should get server we were able to get access
access to the printer from to the printer from any computer
any computer within our within our network.
network.

7 2020-04- FTP server After the configuration of After the configuration of FTP
02 FTP server, we should be server, we were able to exchange
able to exchange the files the files over the internet.
over the internet.

User Feedback

Project Title: Testing and evaluating the design to meet the requirement

Feedback given by: Hari Prasad Signature:

Manager

Nepal Bank Ltd. Date: 2020-04-02

Important features of the project:

I have used star topology to minimize the network collapse when any of the devices in the network
stops functioning. I have used DC to centralize the network to restrict the amount of data that can be

Samir K.C. (HND / First Semester) 28


Networking 2020

accessed by an employee. Switch is used to create a connection with different servers and computers.
Router is used to connect the two different branches so that even if the IP address of the two branches
is different, they can still form a network. Firewall is placed to secure the network from unauthorized
access or incomplete data to enter the network. VPN server is used to secure the transfer of data through
data tunneling and encryption. Print server is used in the network so that every client can access the
number of printers available in the network to decrease the number of printers required thus saving
some cash. WDS server is used so that every computer can access the OS installation file and install
them when required with the administrator privilege. DHCP server is used to provide dynamic IP to
client computers. RODC is used to backup the data so that even when the entire network collapses,
there is no loss of data and can be recovered from RODC.

Checklists:
S.N. Question Yes No Comment
1 Have system requirements been defined & ✓ All the requirements are clear
are they clear? & defined
2 Is the system working properly? ✓ All the system is working
smoothly.

3 Can the system be modified and upgraded ✓ The system can be modified
with future change in network systems? and upgraded in future.

4 Are there any security flaws on design? ✓ There aren’t any security
flaws in the design.

Feedback Evaluation: Signature:

Feedback Evaluated By: Samir K.C. Date: 2020-04-05

After testing all the system, we have found that there are no errors whatsoever in the entire network.
All the system is working smoothly. Data are backed-up so there is no problem even when system
collapses. We can also add or remove devices without interfering with the entire network. Network is
simple and easy to troubleshoot. Entire network was created within the budget so given. Network is

Samir K.C. (HND / First Semester) 29


Networking 2020

made highly secured through the use of Router, Firewall and VPN.

Maintenance schedule to support the networked system

Start Time: 9:00 AM

Finish Time: 5:00 PM

Break Time: 1:00 PM – 1:30 PM

Day 1: Server Maintenance

We check for all possible errors on installed servers

Day 2: Security Maintenance

We search for all possible loopholes in security and viruses in our network computers

Samir K.C. (HND / First Semester) 30


Networking 2020

Day 3: Network Device Maintenance

We search for all the faults in network hardware

Day 4: Computer Maintenance

We search for all errors in client computers

Recommendation for Potential Enhancement

Following are all the potential enhancements in this network: -

• We can use firewall in all branches to enhance the security.

• We can use Linux server instead of windows server as Linux server provides higher level of
security than windows server with auto-detect & auto-delete of virus security.
• We can use server computer with higher configuration to maximize the performance of the
network.
• We can use new versions of routers because it has new features and updated functions.
• We can use local network with higher bandwidth for faster transfer of data.
• We can use biometrics security in server room to enhance the protection of critical files.

Samir K.C. (HND / First Semester) 31


Networking 2020

• We can audit the entire network on regular basis monthly as well as vulnerabilities testing and
penetrating testing on some point.
• We can use genuine OS rather than pirated OS because it has much more features.
Above all, it also has built-in high-level security with fewer instances of errors.

• We can use branded computers for better performance.

Network System based on prepared design

Static IP address:
A static IP address is a permanent number assigned to a computer by an Internet service provider (ISP).
Static IP addresses are useful for gaming, website hosting or Voice over Internet Protocol (VoIP)
services. Speed and reliability are key advantages. Because a static address is constant, systems with
static IP addresses are vulnerable to data mining and increased security risks.

Steps to configure Static IP:


1. Open Run and type ncpa.cpl then press 2. Right click on network then click on
enter properties

3. Select TCP/IPv4 then click on 4. Select provide IP manually then write


properties IP address, subnet mask and click OK

Samir K.C. (HND / First Semester) 32


Networking 2020

Active Directory Domain Services (Primary Domain Controller)


AD DS is a server which is used to centralize the network and authenticates users, stores user account
information and enforces security policy for a Windows domain.

Requirements for AD DS:

1. Server OS
2. Static IP
3. Strong administrative password

Steps to Configure AD DS:


1. Open server manager then select manage 2. Click Next After verifying tasks
and click on add roles and and requirements.
features

Samir K.C. (HND / First Semester) 33


Networking 2020

3. Select installation type and click next 4. Select destination server and click next

5. Click Active Directory Domain 6. Click Add Features


Service

7. Click Next 8. Click Next

Samir K.C. (HND / First Semester) 34


Networking 2020

9. Click Next 10. Click Restart if required option then


click yes and press install

11. After installation completes, server 12. Click Promote this server to Domain
restarts automatically Controller on notification

13. Choose Add a New Forest then type root 14. Type DRSM password and Click Next
domain name and click Next

Samir K.C. (HND / First Semester) 35


Networking 2020

15. Click Next 16. Click Next

17. Click Next 18. Click Next

Samir K.C. (HND / First Semester) 36


Networking 2020

19. Click Install 20. After installation finish server restarts


automatically

21. Press Tools on server manager the select 22. Create User then Right click on user and
Active Directory Users and Computers select properties

Samir K.C. (HND / First Semester) 37


Networking 2020

23. Click on Logon Hours in Account 24. Provide logon hours to user and click ok
Tab

Domain Name System (DNS)

A DNS server is a computer server that contains a database of public IP addresses and their associated
hostnames and in most cases serves to resolve, or translate, those names to IP addresses as requested.

Requirements for DNS server:

1. Server OS
2. Static IP
3. DNS server services

Steps To Configure DNS:


1. Open server manager then select manage and 2. Click Next After verifying tasks and
click on add roles and features requirements.

Samir K.C. (HND / First Semester) 38


Networking 2020

3. Select installation type and click next 4. Select destination server and click next

5. Select DNS and click Next 6. Click Next

Samir K.C. (HND / First Semester) 39


Networking 2020

7. Click Restart if required option then click 8. Click Install


yes

9. After Installation finishes click Close 10. Click Tools on server manager then select
DNS

11. Right click on Forward lookup zone then 12. Click Next
select New Zone

Samir K.C. (HND / First Semester) 40


Networking 2020

13. Select primary zone and click Next 14. Select to all servers running on domain
controllers in this domain then click Next

15. Give Zone name and Click Next 16. Click Next

17. Verify and click Finish 18. Right click Reverse Lookup zone and select new
zone

Samir K.C. (HND / First Semester) 41


Networking 2020

19. Click Next 20. Select IPv4 and click Next

21. Enter Network ID and click Next 22. Click Next

Samir K.C. (HND / First Semester) 42


Networking 2020

23. Verify and click Finish 24. To add IP address, Go to IPv4 property of
network interface

25. Add IP address on DNS name and click 26. Right click on newly created forward look up
add button zone and select New Host (A or AAA)

27. Enter domain name and enter IP address 28. Click OK on Successful Message Box
then check both options and click add
host button

Samir K.C. (HND / First Semester) 43


Networking 2020

29. View on DNS manager 30. Check DNS using nslookup command using
CMD prompt.

Internet Information Services (IIS)

Internet Information Services (IIS), formerly known as Internet Information Server, is a web server
produced by Microsoft. It is used to provide IP address for website using DNS.

Requirements for IIS:

1. Server OS with static IP


2. Web Server Services
3. IIS Server Services
4. DNS Server
Steps to configure IIS server:
1. Open server manager then select manage and 2. Click Next After verifying tasks and
click on add roles and features requirements.

Samir K.C. (HND / First Semester) 44


Networking 2020

3. Select installation type and click next 4. Select destination server and click next

5. Click web server (IIS) and click Next 6. Click Next

7. Click Next 8. Select Restart if required option then click


yes

Samir K.C. (HND / First Semester) 45


Networking 2020

9. Click Install button 10. Click close after installation finishes

11. Go to IIS server manager then right click on 12. Enter site name, specify content directory and
Sites and select add website select IP address of the website and click
OK

Samir K.C. (HND / First Semester) 46


Networking 2020

13.Delete all default document and enter your 14.Enable directory browsing
website document

15. Test website on any browser

Dynamic Host Configuration Protocol (DHCP)

DHCP assigns dynamic IP addresses to client computers that connect to it in order for those clients to
become part of the network.

Requirements for DHCP server:

1. Server OS
2. DHCP server services
Steps to Configure DHCP server:

Samir K.C. (HND / First Semester) 47


Networking 2020

1. Open server manager then select manage and 2. Click Next After verifying tasks and
click on add roles and features requirements.

3. Select installation type and click next

4. Select destination server and click next

5.Select DHCP server 6.Click Add Features

Samir K.C. (HND / First Semester) 48


Networking 2020

7.Click Next 8.Click Next

9.Click Next 10.Select restart if required then click yes

11.Click Install 12.Click close after installation finishes

Samir K.C. (HND / First Semester) 49


Networking 2020

13.Select DHCP on tool tab on server manager 14.Right click on computer name and select
authorize.

15.Rignt click on IPv4 and select New Scope 16.Click Next

17.Write Scope name and click next 18.Enter range of scope

Samir K.C. (HND / First Semester) 50


Networking 2020

19.Click Next 20.Provide lease duration and click Next

21.Select Yes and click Next 22.Click Next

Samir K.C. (HND / First Semester) 51


Networking 2020

23.Check parent domain name and click Next 24.Click Next

25.Select Yes and click Next 26.Click Finish

Samir K.C. (HND / First Semester) 52


Networking 2020

Check DHCP server using ipconfig command in CMD prompt

Print Server

Print servers are connected to a computer network in order to serve the need for printing jobs in a
network that may contain more than one printer.

Requirements for Print Server:

1. Printer
2. Server OS
3. Print server services
Steps to configure Print server:

Samir K.C. (HND / First Semester) 53


Networking 2020

1. Open server manager then select manage and 2. Click Next After verifying tasks and
click on add roles and features requirements.

3. Select installation type and click next 4. Select destination server and click next

5.Select print and document services 6.Click Add Features

Samir K.C. (HND / First Semester) 54


Networking 2020

7.Click Next 8.Click Next

9.Click Next 10.Select print server and LPD services then


click Next

11.Select restart if required option then click yes 12.Click Install

Samir K.C. (HND / First Semester) 55


Networking 2020

13.Click close after installation finishes 14.Select Print management in tools

15.Right click on printers and select add printer 16.Select add a new printer using existing port
then click Next

17.Select install a new driver and click Next 18.Select manufacturer and click Next

Samir K.C. (HND / First Semester) 56


Networking 2020

19.Enter printer name and click Next 20.Verify and click Next

21.Click Finish 22.Connect printer to client by typing IP address


and clicking Ok on Run in Client

computer

23.Right click on printer and select connect option 24.Check whether printer is connected or not by
going to Printer and Fax

Samir K.C. (HND / First Semester) 57


Networking 2020

Virtual Private Network (VPN)

A virtual private network (VPN) is a private network that is built over a public infrastructure. Security
mechanisms, such as encryption, allow VPN users to securely access a network from different
locations via a public telecommunications network, most frequently the Internet.

Requirements for VPN:

1. Remote Access Services


2. Active Directory Services
3. Two LAN cards/network
4. DHCP server

Steps to Configure VPN server

1. Open server manager then select manage and 2. Click Next After verifying tasks and
click on add roles and features requirements.

Samir K.C. (HND / First Semester) 58


Networking 2020

3. Select installation type and click next 4. Select destination server and click next

5.Select Remote Access 6.Click Next

7.Click Next 8.Select Direct Access & VPN then select


Next

Samir K.C. (HND / First Semester) 59


Networking 2020

9.Select Restart is required option and click yes 10.Click Install

11.Click Close after installation finishes 12.Select Routing and Remote Access

Samir K.C. (HND / First Semester) 60


Networking 2020

13.Right click on computer name and select 14.Click Next


configure and enable routing and remote access

15.Select remote access and click Next 16.Select VPN and click Next

Samir K.C. (HND / First Semester) 61


Networking 2020

17.Click Next 18.Select automatically and click Next

19.Select No and click Next 20.Click Finish

Samir K.C. (HND / First Semester) 62


Networking 2020

21. To create VPN connection with client write 22. Click Create a new connection
ncpa.cpl in run of client computer and click OK

23.Click Next 24. Select connect to the network at my


workplace and click Next

25.Select virtual private network connection and 26.Write NBL as connection name and click
click Next Next

Samir K.C. (HND / First Semester) 63


Networking 2020

27.Write your IP address and click Next 28.Click Finish

29.Select allow access in dial-in tab of the user 30.Write your login name and password then
click connect

31.After verifying username and password, VPN connect successfully

Samir K.C. (HND / First Semester) 64


Networking 2020

Read Only Domain Controller (RODC)


RODC is a server that provides backup to the primary domain controller. It can only replicate the
changes in the PDC while there wouldn’t be a change from within the RODC.

Requirements for RODC:

1. Server OS
2. Static IP
3. Primary Domain Controller
4. Active Directory Domain Services Steps to Configure RODC:
1. Open server manager then select manage 2. Click Next After verifying tasks and
and click on add roles and features requirements.

Samir K.C. (HND / First Semester) 65


Networking 2020

3. Select installation type and click next 4. Select destination server and click next

5.Select Active Directory Domain Services and 6.Click Next


click Next

Samir K.C. (HND / First Semester) 66


Networking 2020

7.Click Next 8.Select restart if required option and click yes

9.Click Install 10 Click Close after installation completes

Samir K.C. (HND / First Semester) 67


Networking 2020

11.Select add a domain controller to an 12.Enter domain name and password then click
existing domain and click select OK

13.Select a domain and click OK 14.Click Next

15.Enter password and click Next 16.Click Next

Samir K.C. (HND / First Semester) 68


Networking 2020

17.Add user on member tab and click Ok 18.Click Next

19.Click Next 20.Click Next

Samir K.C. (HND / First Semester) 69


Networking 2020

21.Click Next 22.Click Install

23. Check the RODC

Child Domain Controller (CDC)


CDC is a part of the primary domain controller which helps in load balance of the network system.

Requirements for CDC:

1. Server OS with Static IP


2. Strong administrative password
3. Primary domain controller on same network

Steps to Configure CDC:

Samir K.C. (HND / First Semester) 70


Networking 2020

1. Open server manager then select manage 2. Click Next After verifying tasks and
and click on add roles and features requirements.

3. Select installation type and click next 4. Select destination server and click next

5.Click Active Directory Domain Service 6.Click Add Features

Samir K.C. (HND / First Semester) 71


Networking 2020

5. Click Next 6. Click Next

Samir K.C. (HND / First Semester) 72


Networking 2020

7. Click Next 8. Click Restart if required option then click


yes and press install

9.Click Install 10.Click close after installation finishes

11.Select add a new domain to an existing 12.Add domain name and password then click
forest then click select ok

Samir K.C. (HND / First Semester) 73


Networking 2020

13.Select a domain from the forest and click ok 14.Click Next

15.Enter password and click Next 16.Click Next

17.Click Next 18.Click Next

Samir K.C. (HND / First Semester) 74


Networking 2020

19.Click Next 20.Click Install

21.Check CDC

Samir K.C. (HND / First Semester) 75


Networking 2020

DHCP Flame Relay Agent

A DHCP relay agent is any host that forwards DHCP packets between clients and servers. Relay
agents are used to forward requests and replies between clients and servers when they are not on the
same physical subnet.

Requirements for DHCP Flame Relay Agent

1. Server OS with Static IP


2. Strong Administrative password
3. DHCP server
4. Two different network cards
5. Both cards connect on different network
Steps to Configure DHCP relay agent server
1. Open server manager then select manage and 2. Click Next After verifying tasks and
click on add roles and features requirements.

Samir K.C. (HND / First Semester) 76


Networking 2020

3. Select installation type and click next 4. Select destination server and click next

5.Select Remote Access 6.Click Next

7.Click Next 8.Select Direct Access & VPN and routing then
select Next

Samir K.C. (HND / First Semester) 77


Networking 2020

9.Select restart if required option and click yes 10.Click Install

11.Click close after installation finishes 12.select routing and remote access in tools

Samir K.C. (HND / First Semester) 78


Networking 2020

13.Right click on computer name and select 14.Click Next


routing and remote access

15.Select Custom configuration and click 16.Select LAN routing and click Next
Next

17.Click Finish 18.Select Start service

Samir K.C. (HND / First Semester) 79


Networking 2020

19.Right click on General and select New 20.Select DHCP relay agent and press OK
Routing Protocol

21.Right click on DHCP relay agent and 22.Add both Ethernets as well as Internal and click
select new interface Ok

23.Click Ok 24.After adding

Samir K.C. (HND / First Semester) 80


Networking 2020

Windows Deployment Server (WDS)

Windows Deployment Services is a server role that gives administrators the ability to deploy Windows
operating systems remotely.

Requirements for WDS server:

1. Active Directory Domain Services


2. DHCP
3. DNS
4. Image file of OS
Steps to configure WDS server:
1. Open server manager then select manage and 2. Click Next After verifying tasks and
click on add roles and features requirements.

3. Select installation type and click next 4. Select destination server and click next

5.Select Windows Deployment Services and 6.Click Next

Samir K.C. (HND / First Semester) 81


Networking 2020

click Next

7.Click Next 8.Select both and click Next

9.Select restart if required option and click yes 10.Click Install

11.Select Windows Deployment Services in 12.Right click on computer name and select
Tools configure server

Samir K.C. (HND / First Semester) 82


Networking 2020

13.Click Next 14.Select Standalone server and click Next

15.Click Next 16.Click Next

17.Select respond to all client computers and 18.Click Finish


also select the checkbox then press Next

Samir K.C. (HND / First Semester) 83


Networking 2020

19.Right click on Install Image then select Add 20.Add image location and click Next
Image file ten select Next

21.Click Next 22.Click Next

23.Click Finish 24.Right click on Boot images and select add


boot image

Samir K.C. (HND / First Semester) 84


Networking 2020

25.Add boot image location and click Next 26.Click Next

27.Click Next 28.To start WDS right click on computer name


and select all tasks then select start

Samir K.C. (HND / First Semester) 85


Networking 2020

Document and Analyze test results against expected result


S.N. Date What is tested? Expected Output Actual output

1 2020-04-01 DC After the configuration of After the configuration of


DC, we should be able to DC, we were able to create
create and manage users & and manage users & policies.
policies.

2 2020-04-01 DHCP After the configuration of After the configuration of


DHCP server we should be DHCP server we were able to
able to provide dynamic IP provide dynamic IP to client
to client computers. computers.

3 2020-04-01 RODC After the configuration of After the configuration of


RODC we should be able RODC we were able to

Samir K.C. (HND / First Semester) 86


Networking 2020

to backup the data but cannot backup the data but couldn’t
modify it. modify it.

4 2020-04-02 WDS After the configuration of After the configuration of


WDS server we should be WDS server we were able to
able to access the windows access the windows setup file
setup file and use it from and use it from client
client computers to install computers to install windows.
windows.

5 2020-04-02 VPN After the configuration of After the configuration of VPN


VPN server our data should server our data was
be secured while
transferring. secured while transferring.

Samir K.C. (HND / First Semester) 87


Networking 2020

6 2020-04-02 Print server After the configuration of After the configuration of


print server, we should get print server, we were able to
access to the printer from get access to the printer from
any computer within our any computer within our
network. network.

Samir K.C. (HND / First Semester) 88


Networking 2020

Critical reflection to evaluate my work

Network Design

In my network, I have used Star topology as a communication medium while I have also centralized
the data and control by Configuring Domain controller in the server computer. I have also used RODC
to replicate the data so that in case of errors we can still retrieve data. I have used Routers in each of
the branches along with firewall with them to construct a communication between two networks and
secure the connection. I have also used VPN to secure the data transferred through data tunneling. I
have used CDC for branch offices to load the balance and minimized the chance of server collapse. I
have used print server to connect computers to the printer so that the employees can access the number
of printers without needing individually. I have also used WDS server so that OS can be accessed from
any computer in the network and install it.

Test Plan of the proposed design


I have also created a test plan of the network. I have checked the functioning of the network and
corrected all the flaws. For the future of the network, I have also created a maintenance schedule which
can be implemented to secure the possible collapse of network. I have divided maintenance schedule
into four parts which are Server maintenance which will be on first day of maintenance while Security
maintenance, Network Device maintenance and computer maintenance that follows after it. Auditing,
Penetration testing, etc. are also among the task within my test plan.

Implementation of the Design


I have implemented my design with the communication as star topology and centralized the network
with the help of domain controller. Router was placed for the sake of connecting two different networks
while firewall is placed between router and wireless access point to detect and erase the possible threat
and unauthorized access on the network. Router is further connected with switch when then connects
the entire servers and client computers. I have also used DHCP server to distribute the dynamic IP to
the client computers. I have configured a print server to make sure that a small number of printers can
fulfill the entire print operation of client computers. I have also used VPN server in this network so
that there are no data theft when transferring the data. WDS server as also configured to make it easy
for staff to renew their OS without need for file in their computer.

Samir K.C. (HND / First Semester) 89


Networking 2020

Diagnosis of the implemented Network


Under the diagnosis of the client and other staff, we have come to the conclusion that there are no
errors in the implemented network and all the servers are working smoothly. Data is continuously
being replicated if it’s a change in PDC. There were no loopholes in the network and there were no
viruses in the network as well.

Positive & Negative aspect of implemented network


There are many positive aspects of this network. It is centralized so the administrator can limit the data
flow and can implement new policies with ease. Due to the use of VPN, our data transfer in this
network is highly secured. Use of router has made the network even faster with additional security as
a firewall. If there is any hardware failure, its location can easily be determined and it’s easy to
troubleshoot.

As for the negative aspect on this network, even though the data is secured by various layers of security,
there can still be hardware damages. If the central device is broken then the entire network will
collapse. Since it is a centralized network, if somehow anyone managed to hack the central device then
they get access to all the available data and information.

Recommendations:
We can use firewall in all branches to enhance the security. We can use Linux server instead of
windows server as Linux server provides higher level of security than windows server with autodetect
& auto-delete of virus security. We can use server computer with higher configuration to maximize
the performance of the network. We can use new versions of routers because it has new features and
updated functions. We can use local network with higher bandwidth for faster transfer of data. We can
use biometrics security in server room to enhance the protection of critical files. We can audit the
entire network on regular basis monthly as well as vulnerabilities testing and penetrating testing on
some point. We can use genuine OS rather than pirated OS because it has much more features. Above
all, it also has built-in high-level security with fewer instances of errors. We can use branded computers
for better performance.

Samir K.C. (HND / First Semester) 90


Networking 2020

Conclusion

The system has been properly tested and analyzed with positive result. I have also created maintenance
schedule which can be helpful in future management of network. User feedback on the network was
highly rated. The design of the network fulfills the requirement of the organization. It is also easy to
understand, implement, manage and maintain by the user. The information can be passed to branch
offices from head offices securely through the installed VPN server. In this way, as a network
administrator of Landmark IT network system, I managed to install all the server that helps to
automatically assign IP, secure files, etc.

Samir K.C. (HND / First Semester) 91


Networking 2020

Bibliography
Agasi, O., 2018. Techopedia. [Online]
Available at: http://www.techopedia.com
[Accessed 25 April 2020].

Ambekar, T., 2018. Quora. [Online] Available


at: http://www.quora.com [Accessed 25 April
2020].

Ayres, C., 2018. Vittana. [Online] Available at:


http://www.vittana.org [Accessed 12 May
2020].

Emberton, N., 2017. Computer Hope. [Online] Available


at: https://www.computerhope.com [Accessed 08 June
2020].

Jayasundara, M., 2017. MSc. Computer Networks. [Online] Available at:


http://www.msccomputernetworks.blogspot.com [Accessed 25 June
2020].

Neagu, C., 2017. Digital Citizen. [Online]


Available at: http://www.digitalcitizen.life
[Accessed 25 June 2020].

Rose, M., 2007. Tech Target. [Online]


Available at: https://whatis.techtarget.com
[Accessed 08 July 2020].

Sharma, S., 2017. Quora. [Online] Available at:


http://www.quora.com [Accessed 25 July 2020].

Shekhawat, R. S., 2017. Quora. [Online]


Available at: http://www.quora.com [Accessed
13 August 2020].

Sukosd, A., 2018. Quora. [Online] Available at:


http://www.quora.com [Accessed 17 Sept 2020].

Samir K.C. (HND / First Semester) 92


Networking 2020

Turambekar, R., 2016. Quora. [Online]


Available at: http://www.quora.com [Accessed
19 Dec 2020].

Verma, D., 2018. Quora. [Online] Available at:


http://www.quora.com [Accessed 22 Dec 2020].

Samir K.C. (HND / First Semester) 93

You might also like