Professional Documents
Culture Documents
Submitting To:
LECTURER
UNIVERSITY OF DHAKA
Submitting By:
ID NAMES
029-13-035 Al-Amin
19.12.2023
University of Dhaka
Subject: Submission of term paper on the topic- Networking and Data communication: A Study on MIS
LAB, University of Dhaka.
Dear Ma’am,
We want to humbly state that we have been assigned to complete a term paper on networking and data
communication: A Study on MIS LAB, under the course Networking: Telecommunication, Corporate and
Social.
Our Group tried our best to prepare this term paper to, while preparing the term paper, we have
researched about the MIS LAB, in support from the lab assistant. The term gave us a great opportunity
know about our overall lab overview. We therefore, pray and hope that you would kindly accept our
term paper and oblige thereby.
Sincerely yours,
University of Dhaka
Acknowledgement
We would like to express our gratitude to our Almighty ALLAH who has helped to complete this great
work.
Later, we are very grateful to our course teacher Ms. Nahida Sultana, Lecturer at Department of
Management Information Systems, University of Dhaka who has directed and supported us to prepare
this task.
We enjoyed the course for our honorable course teacher who always cooperated us to know different
thing and to gather dynamic knowledge.
Again, we express our gratefulness to our Madame who conducted our course throughout the semester.
Sincerely,
Group 7
Section A
Batch:13th
University of Dhaka
Executive summary
The main objective of this group term paper is to overview the MIS LAB history and to know the layout
and configuration used in the lab and how does the networking work in the lab.
The necessary information was taken from by researching our MIS LAB. We have described all the
configuration used in the MIS lab.
Overall this term paper has helped us to know deeply about the network configuration of our MIS LAB
and its layout. We have also known about the networking devices used in the lab. We also gave some
recommendations for future improvements of existing structure.
Introduction
In the quickly changing field of educational technology, including creative ideas is essential to building
productive and economical computer environments. Our lab's implementation of NComputing vSpace
Server is an example of a forward-thinking strategy to satisfy the various computing demands of our end
customers.
transformed into a strong platform that can accommodate numerous workstations, maximize resource
usage, and improve overall system performance. The purpose of this paper is to give end users a
thorough understanding of the function and implications of the NComputing vSpace Server in our
specialized lab setting.
More about how this technology drives our lab with scalability, flexibility, and efficient management
when we get into the details of its implementation can be learned from here. NComputing vSpace is the
foundation of our lab's computing infrastructure, handling everything from assigning CPU, GPU, and disk
space to individual workstations to centralizing vital services like DHCP, DNS, the department website,
and the ERP system.
In order to guarantee a reliable and safe computing environment, we will examine the network
architecture, VLAN configurations, and security measures put in place. We will also discuss the
advantages of virtualized workstations, emphasizing the smooth user experience made possible by thin
clients or access devices.
The NComputing vSpace Server is a deliberate step to improve resource efficiency, accessibility, and
dependability in our lab, not just a technical addition. Your experience and productivity as end users are
our top priorities, and the integration of NComputing vSpace is a prime example of our dedication to
providing a state-of-the-art computing environment.
This study examines how our lab is transformed into a dynamic, cooperative, and technologically
advanced space by NComputing vSpace and offers som/e recommendations for improving the lab.
Objectives of the study
We now know more about the University of Dhaka's MIS lab thanks to this study. Every networking gear
used in the lab is introduced to us. Additionally, we are fully aware of how the networking equipment
operated in the lab.
The purpose of this study was to learn more about networking devices. The lab's operations have been
examined, and Ncomputing's operations are meticulously documented. The benefits and drawbacks are
also explained.
Findings
Through questioning, the major data was gathered from MIS lab help. We have gathered as much
valuable information as much as we could. All the Secondary data was gathered from several websites
and papers relevant to the MIS lab.
Overview
Networking and virtualization are essential components in the development of IT systems. Networking is
used by virtualization to create channels of communication between virtual instances and external
systems. This cooperation is most visible in virtual switches and virtual local area networks (VLANs),
where virtualized network components make it easier to isolate and segment traffic, enhancing both
performance and security. By placing a virtualized layer over conventional physical networks, network
virtualization produces a more dynamic and adaptable environment that can change to meet the
demands of workloads that are virtualized. Through this connection, businesses can streamline the
management of complex infrastructures by achieving a higher degree of automation and orchestration.
Virtualization and networking together provide unmatched scalability and flexibility. Networking offers
the ability of establishing seamless connections and communication between various resources, while
virtualization allows for the dynamic distribution of computing resources. Virtualization and networking
work together to create virtual data centers in cloud environments where computing resources may be
deployed, scaled, and decommissioned as needed. Organizations may adjust to shifting workloads and
business needs with the flexibility to grow vertically by adding more resources to existing instances or
horizontally by adding new virtual instances. Today's fastpaced and dynamic business contexts, where
agility and responsiveness are critical, this flexibility is extremely important, Networking and
virtualization play a major role in cost effectiveness and resource optimization. Through virtualization, a
single physical server may house several virtual instances, which eliminates the need for a large
hardware infrastructure. Data center footprints are reduced as a result of this consolidation, which also
lowers operating expenses and energy usage. Networking facilitates the effective pooling of resources,
which further improves cost-efficiency. Content delivery networks and load balancing are two examples
of technologies that improve workload distribution among servers for maximum resource
utilization and performance. Virtualization also makes it possible to create virtual networks that function
apart from the real infrastructure underneath them, which encourages the more effective use of
network resources.
Virtualization and networking work together to give enterprises a level of agility in the deployment and
management of IT resources that has never been seen before. The time it takes to launch new services is
shortened by virtualization's ability to supply virtual machines and apps quickly. By enabling the quick
deployment of network configurations and services, networking enhances this agility. Network
infrastructure can be managed centrally and programmably with the help of technologies like
SoftwareDefined Networking (SDN), which enables administrators to adjust to changing needs without
requiring manual intervention. Virtualization and networking work together to support DevOps
processes, which involve development and operations teams working together seamlessly
to quickly deliver and update programs. Improving the security and isolation of virtualized environments
is largely dependent on networking. Securing virtualized infrastructure perimeters is made possible by
intrusion detection/prevention systems, firewalls, and VLANs. Virtual networks' isolation guarantees that
the integrity of one virtual instance's security won't be jeopardized by a breach in another. Furthermore,
networking technologies allow traffic to be segmented, which enables businesses to implement access
restrictions and security standards. By encapsulating workloads, virtualization supports these efforts by
simplifying the implementation of security measures at the hypervisor level. Virtualization and
networking work together to provide a strong security framework that protects important data and
applications.
Although there are many advantages to the combination of networking and virtualization, there are also
obstacles that businesses must overcome. One important thing to keep in mind is how difficult it is to
manage virtualized networks. Administrators need to adjust to new tools and techniques for monitoring,
troubleshooting, and securing virtualized environments as infrastructures grow more distributed and
dynamic. There may be difficulties in integrating with legacy systems and making sure that the
networking hardware is compatible.
Organizations must also manage performance related issues, particularly when numerous virtual
instances are generating a lot of network traffic.
As new technologies emerge and change the IT landscape, virtualization and networking continue to
operate together. For example, edge computing reduces latency and improves user experience by
bringing computing resources closer to end users by utilizing both virtualization and networking.
Another trend that is influencing the future is the combination of virtualization and networking
technologies with AI and ML.
While AI powered virtualization management simplifies processes and boosts efficiency, AI driven
analytics in networking can optimize resource allocation and increase security.
In conclusion, the way businesses plan, implement, and oversee their IT infrastructures changed as a
result of the convergence of virtualization and networking. This partnership creates a computing
environment that is dynamic, adaptable, and effective, meeting the needs of contemporary industry. The
future of networking and virtualization will be greatly influenced by their integration, which will lay the
groundwork for creative solutions and propel industry-wide digital transformation as technology
develops.
NComputing:
NComputing has emerged as a key player in the field of desktop virtualization, providing creative
solutions to the problems of cost, energy consumption, and scalability in computing environments.
NComputing is a market leader in desktop virtualization solutions, offering cutting-edge technology that
allow numerous users to use a single computer or server. NComputing assists enterprises in achieving
cost-effective and scalable computing environments by maximizing resource use.
This means that they enable numerous users to access the same computer at the same time, each with
their own virtual desktop. The products of NComputing are intended to be both cost-effective and
energy-efficient. NComputing provides a wide range of products.
• Thin clients: These are low-cost, tiny devices that connect to a central server. They often feature
limited processing power and storage, but they give users
• Virtualization software: You can use this software to create several virtual desktops on a single physical
server. Each virtual desktop can be utilized by a different user and can run different applications
concurrently.
• Management tools: These tools let you manage your NComputing environment by allowing you to add
and remove users, assign rights, and monitor performance.
Benefits of NComputing
• Cost Effectiveness:
NComputing saves money on hardware by allowing several users to share a single server.
• Energy Savings:
• Scalability:
• Centralized Management:
VSpace:
NComputing's VSpace product range provides software and hardware solutions for virtual desktop
infrastructure (VDI) and thin client computing. It enables numerous users to access the same computer
at the same time, each with their own virtual desktop environment.
• vSpace Pro: For small and medium-sized enterprises, vSpace Pro supports up to 100 concurrent user
sessions per
host system.
• vSpace Enterprise: For large businesses that require an infinite number of user sessions as well as
sophisticated capabilities such as centralized management, security, and compliance.
• Cost savings: When compared to typical PCs, vSpace saves money on hardware by sharing a single
computer.
• Energy efficiency: vSpace's thin clients use less energy than standard PCs.
• Scalability: vSpace is simply scalable to accommodate an increasing number of users.
• Security: To keep data secure, vSpace includes features such as user
• Simple administration: Administrators can manage all vSpace instances from a single terminal.
Virtualization of server
The method of generating several virtual servers on a single physical server is known as server
virtualization. Each virtual server runs its own operating system and programs, and they are
completely independent of one another. Organizations can improve resource usage, boost agility, and
save expenses as a result of this. Server virtualization is a low-cost technique to deliver web hosting
services while maximizing the use of current IT infrastructure resources. Servers only use a small portion
of their computing power without server virtualization. Because the workload is allocated to only a
subset of the network's servers, servers sit idle. Data centers get overloaded with unproductive servers,
resulting in resource and power waste. Server virtualization allows each virtual server to operate
independently by dividing each physical server into many virtual servers.
physical hardware via a software layer known as a hypervisor. On top of the real server, the hypervisor
then creates several virtual machines (VMs). Each virtual machine has its own CPU, memory, storage,
and network interface.
• Operating system virtualization: This sort of virtualization runs several isolated instances of an
operating system on a single physical server using software known as a container. Each container uses
the same kernel as the others, but it has its own set of
DHCP Server
A DHCP server is an essential component of every Internet Protocol (IP) network. Its major duty is to
assign IP addresses and other network setup information to network devices.
• Dynamic IP addresses: IP addresses are often assigned dynamically, which means they are leased for a
set length of time (lease time) and can be reassigned to other devices once the lease expires. This
enables optimal use of IP addresses as well as flexibility in a changing network environment.
• Setup parameters: In addition to giving IP addresses, DHCP servers can supply devices with additional
critical network setup parameters such as:
o Subnet mask
o Default gateway
o Time servers
When a DHCP-enabled client joins to the network, the DHCP server assigns an IP address from a pool
that it maintains. Because IP addresses are leased dynamically rather than statically, when they are no
longer in use, they are automatically returned to the pool for reallocation. The network administrator
configures DHCP servers to save TCP/IP configuration data and transmit address configuration to DHCP-
enabled clients in the form of a lease offer.
The DHCP server maintains a database including the following configuration of data:
client assignment.
• Reserved IP addresses assigned to specific DHCP subscribers. This allows for the consistent assignment
of a single IP address to a single DHCP client.
• The lease duration, or how long an IP address can be used before requiring a lease renewal.
Requested DHCP options are additional settings that a DHCP server can assign to clients. DHCP settings
include the router (default gateway), DNS servers, and DNS domain name.
• Consistent IP address setting. DHCP eliminates address conflicts and typographical errors that might
occur when specifying IP addresses manually by allocating an IP address to several machines at the same
time.
• Reduced network management. To reduce network administration, the following DHCP capabilities are
included:
o An automatic and centralized TCP/IP configuration.
DNS Server
A DNS server, also known as a name server, is an important part of the internet architecture. It functions
as the internet's phonebook, converting human-readable domain names (such as google.com) into
numerical IP addresses that computers can understand. You can now simply access websites and other
online resources without having to remember their IP addresses.
• Easier access to online resources: Because you don't have to remember IP addresses, you can access
websites and other online resources more easily.
• Increased efficiency: DNS servers cache IP addresses, reducing the number of times they must be
searched up and increasing internet browsing speed.
• Adaptability: DNS servers can be readily upgraded to match changes in website addresses or domain
names.
• Safety: DNS servers can be used to execute safety measures such as limiting access to malicious
websites.
• Public DNS servers: These are DNS servers that are publicly available for use by anyone. Google Public
DNS (8.8.8.8 and 8.8.4.4) and Cloudflare DNS (1.1.1.1 and 1.0.0.1) are two popular choices.
• Private DNS servers: These are DNS servers run by enterprises or organizations for internal usage
alone.
• Authoritative DNS servers: These are the servers that have the official IP address information for a
domain name.
A VLAN is a logical collection of devices that are configured to communicate as if they were on the same
physical network, independent of their physical location. This enables you to construct distinct broadcast
domains within a same physical network, which can be advantageous in terms of security, performance,
and manageability. Here are some important points to remember about VLAN technology:
Why VLAN:
Carrier Sense Multiple Access/Collision Detection (CSMA/CD) was utilized in early Ethernet to facilitate
data flow across shared media.
By isolating various users or groups of users on the same physical network, VLAN technology adds
another layer of protection. This guarantees that sensitive data is only accessed by authorized people
and helps prevent unauthorized access from other sources.
Collisions, which are a major concern on Ethernet networks with multiple hosts, can cause broadcast
storms. This causes the network to completely fail or deteriorate. When employing Layer 2 devices to
connect LANs, data transfer within a LAN may be limited.
Benefits
• Increased security: By isolating broadcast traffic to specified VLANs, you can prevent sensitive data
from being broadcast to unauthorized devices.
• Improved performance: By segmenting traffic, you can reduce network congestion while improving
overall performance for important applications.
• Simplified network management: VLANs can be used to organize devices into logical groupings, making
network management and troubleshooting easier.
• Greater flexibility: VLANs can readily added and withdrawn as needed, making them a versatile choice
for expanding networks.
Types of VLANs:
• Port-based VLANs:
These VLANs are assigned to specific switch ports. Devices connected to these ports will be assigned to
the selected VLAN automatically.
These VLANs are based on network device MAC addresses. Devices with appropriate MAC addresses will
be allocated to the designated
VLAN automatically.
• IP subnet-based VLANs:
These VLANs are based on network devices' IP subnets. Devices inside a specific IP subnet will be
assigned to the designated VLAN automatically.
• Protocol-based VLANs:
These VLANs are based on network traffic type. You could, for example, build a VLAN for VoIP traffic and
another for data traffic.
VLANs can be used to separate sensitive data from normal network traffic, such as bank records or
medical information.
VLANs can be used to create distinct networks for guests or visitors, thereby protecting your primary
network from unwanted access.
• Traffic prioritization:
VLANs can be used to prioritize traffic for key applications like VoIP or video conferencing.
By segmenting traffic into smaller groups, VLANs can help to reduce network congestion.
In the MIS Lab, the NComputing virtualization system uses a mix of hardware and software to produce
several virtual desktops on a single physical server. This enables better resource usage and cost
reductions.
• Two servers act as vSpace Server 10 hosts in the lab. NComputing's vSpace Server 10 is a virtualization
solution that allows several users to share the computing capabilities of a single physical server.
• Each vSpace Server 10 is in charge of hosting and administering multiple virtual desktop sessions at the
same time.
The L300 thin clients have USB ports for connecting mice and keyboards. Users at each workstation can
now interact with their virtual desktop sessions using locally connected input devices.
3. Ethernet Switches:
• Ethernet switches enable connectivity between L300 thin clients, workstations, and servers. These
switches provide effective communication and data transfer between thin clients and servers.
4. Network Architecture:
• Ethernet switches are essential for controlling network traffic between thin
clients and vSpace Server 10 servers. They provide a dependable and high-performance link between
workstations and virtualized servers.
5. Workflow:
• Users at each workstation log in using the L300 thin client devices.
• The L300 thin clients connect to one of the vSpace Server 10 servers.
• The virtual desktop sessions for the associated L300 thin clients are managed
by the vSpace Server 10 hosts, giving each user a personalized and secure computing environment.
Software:
• NComputing vSpace:
This program is used to create and administer virtual desktops on vSpace servers
• Operating System:
Each virtual desktop has its own operating system, which in this case is Windows 10.Applications are
installed on the vSpace servers and made available to users via their virtual desktops.
Implementation Process
1. Set up the vSpace servers with vSpace software. 2. Set up the vSpace servers to generate virtual
desktops. For each virtual desktop, this includes selecting the operating system, apps, and resources
(CPU, RAM, disk space). 3. Use the Ethernet switch to connect the L300 clients to the vSpace servers. 4.
Download and install the L300 client software on each L300 client. 5. Set up the L300 clients to
communicate with the vSpace servers.
For operations as well as network and computer security, the MIS Lab has a
variety of software on its workstations as well as vSpace servers. For example, Anaconda distribution is
installed for data analytics and machine learning work, R package is also available, as is NetBeans IDE for
Java language-based work and Codeblocks IDE for C/C++. Cisco products are utilized for security.
Security System:
preparation. The lab serves as a hub for collaborative initiatives and innovative projects, which
corresponds with the department's aim of excellence in education and research. The presence of a
technical team dedicated to website and server maintenance ensures that the lab's resources run
smoothly and reliably.
Challenges and Recommendation:
A bottleneck in a computer arises when one component inhibits the performance of another, resulting in
a subpar user experience. It's like having a race vehicle with a powerful engine but thin tires - despite the
engine's potential, the tires will ultimately limit the car's speed. This bottleneck could be caused by a
CPU bottleneck, RAM bottleneck, or GPU bottleneck. To avoid this bottleneck, lab assistants and
technicians must determine the sources of the bottleneck and take the necessary precautions. Since
there are 62 workstations and the application and work that each station's user uses and does is very
high in comparison to the quantity of resources
allotted to each workstation. as a result, the number of server connections should be increased.
Conclusion:
The MIS NComputing Laboratory is a flagship facility that embodies the department's
mission to give students access to state-of-the-art resources and capabilities. The fusion of cuttingedge
infrastructure, specialized servers, and networking technologies fosters an atmosphere that is ideal for
promoting excellence in research and teaching.
The lab stays at the forefront of technological education in the field of Management Information Systems
as it develops further with the inclusion of an ERP system and continuous improvements.