0% found this document useful (0 votes)
104 views108 pages

Networking Assignment

Uploaded by

roodlesnepal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
104 views108 pages

Networking Assignment

Uploaded by

roodlesnepal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 108

INTERNATIONAL SCHOOL OF

MANAGEMENT AND TECHNOLOGY

FACULTY OF COMPUTING
ASSIGNMENT COVER SHEET
This form is to be completed by students submitting assignments of level 4 and level 5.
Students are required to complete all sections and attach to your assignment.

STUDENT DETAILS

STUDENT NAME Prashna Acharya

STUDENT ID [email protected]

UNIT AND ASSIGNMENT DETAILS

UNIT TITLE Unit 2: Networking

UNIT NUMBER M/618/7393

ASSIGNMENT DinaTech Solution Network System


TITLE

ISSUE DATE 6/12/2023 DUE DATE 25/02/2024

ASSESSOR NAME Ruman Thapa

ESTIMATED WORD 1100


LENGTH

SUBMISSION

HAND IN DATE 24/02/2024


Networking

DECLERATION AND ACKNOWLEDGEMENT


When submitting assignments, each student must sign a declaration confirming
that the work is their own.
Plagiarism and Collusion
Plagiarism: to use or pass off as one’s own, the writings or ideas of another without
acknowledging or crediting the source from which the ideas are taken.

Collusion: submitting an assignment, project or report completed by another person and


passing it off as one’s.
In accordance with the Academic Integrity and Plagiarism Policy:

1. I declare that:
a) this assignment is entirely my own work, except where I have included fully-documented
references to the work of others,
b) the material contained in this assignment has not previously been submitted for any other
subject at the University or any other educational institution, except as otherwise
permitted,
c) no part of this assignment or product has been submitted by me in another (previous or
current) assessment, except where appropriately referenced, and with prior permission
from the Lecturer / Tutor / Unit Coordinator for this unit.

2. I acknowledge that:
a) if required to do so, I will provide an electronic copy of this assignment to the assessor;
b) the assessor of this assignment may, for the purpose of assessing this assignment:
I. reproduce this assignment and provide a copy to another member of academic
staff;
II. communicate a copy of this assignment to a plagiarism checking service such as
Plagiarism Check (which may then retain a copy of this assignment on its
database for the purpose of future plagiarism checking).

I am aware of and understand that any breaches to the Academic Code of Conduct will be
investigated and sanctioned in accordance with the College Policy.

SIGNATURE Prashna DATE 20/02/2024

Prashna Acharya (First Semester) 2|P a g e


Networking

Table of Contents
Acknowledgement................................................................................................................................3

Introduction..........................................................................................................................................3

Activity 1...............................................................................................................................................4

Presentation:........................................................................................................................................4

Supporting Notes...............................................................................................................................25

Computer Network............................................................................................................................25

LAN.................................................................................................................................................25

LAN Advantages.........................................................................................................................26

LAN Disadvantages.....................................................................................................................26

MAN................................................................................................................................................26

MAN Advantages........................................................................................................................26

MAN Disadvantages....................................................................................................................26

WAN................................................................................................................................................27

WAN Advantages........................................................................................................................27

WAN disadvantages....................................................................................................................27

Wired Network...................................................................................................................................28

Ethernet Networks:..........................................................................................................................28

Fiber Optic Networks:.....................................................................................................................28

Coaxial Cable Networks:.................................................................................................................28

Wireless Network...............................................................................................................................28

WPAN (Wireless Personal Area Network).....................................................................................29

WLAN (Wireless Local Area Network)..........................................................................................29

WMAN (Wireless Metropolitan Area Network).............................................................................29

WWAN (Wireless Wide Area Network).........................................................................................29

Prashna Acharya (First Semester) 3|P a g e


Networking
Hybrid Network.................................................................................................................................30

Advantages:.....................................................................................................................................30

Disadvantages:.................................................................................................................................30

OSI Model...........................................................................................................................................30

Physical Layer.............................................................................................................................31

Data link layer..............................................................................................................................31

Application layer.........................................................................................................................32

Advantages of OSI Model...............................................................................................................32

Disadvantages of OSI Model...........................................................................................................32

Benefits of TCP/IP:..........................................................................................................................33

Drawback of TCP/IP:......................................................................................................................33

802.1X.................................................................................................................................................34

802.1X Used for:.............................................................................................................................34

Network Topology.............................................................................................................................34

Types of network topology..............................................................................................................35

Bus Topology...................................................................................................................................35

Ring Topology.................................................................................................................................35

Star Topology..................................................................................................................................36

Mesh Topology................................................................................................................................36

Tree Topology.................................................................................................................................37

Hybrid Topology.............................................................................................................................37

Communication..................................................................................................................................37

Advantages:.....................................................................................................................................38

Disadvantages:.................................................................................................................................38

Bandwidth Requirements.................................................................................................................38

Prashna Acharya (First Semester) 4|P a g e


Networking
Networking Principles.......................................................................................................................39

Network Protocol...............................................................................................................................40

Networking Devices...........................................................................................................................41

Network Server..................................................................................................................................43

1. Web server:........................................................................................................................43

2. File server:.........................................................................................................................43

3. Database server:................................................................................................................43

4. Mail server:........................................................................................................................43

5. Application server:............................................................................................................43

6. Domain name system (DNS) server..................................................................................43

Access Permissions.............................................................................................................................43

Relation between network hardware and software:.......................................................................45

Workstation hardware:.....................................................................................................................45

Range of Servers................................................................................................................................46

Selection of Best Server.....................................................................................................................47

Selection of Best Topology................................................................................................................48

Selection of Best Protocols................................................................................................................49

Conclusion..........................................................................................................................................50

Activity 2:...........................................................................................................................................50

Introduction........................................................................................................................................50

Evidence of implemented network...................................................................................................50

Network Design..................................................................................................................................51

Implementation of designed network system..................................................................................51

System requirement.........................................................................................................................52

Networking Devices Used in DinaTech IT Solution.......................................................................64

Prashna Acharya (First Semester) 5|P a g e


Networking
IP Configuration................................................................................................................................65

Feedback Form..................................................................................................................................66

User Feedback:................................................................................................................................66

Evaluation of the system:..................................................................................................................69

Аnаlysis of user feedbаck to optimize designs аnd improve efficiency of connected solutions:.69

Regular Maintenance Plan................................................................................................................70

Maintenance of Day 1......................................................................................................................71

Maintenance of Day 2......................................................................................................................71

Maintenance of Day 3......................................................................................................................72

VMware Workstation Implementation...........................................................................................72

Domаin Controller (DC):..................................................................................................................72

Steps to Configure AD DS in VMware:..........................................................................................72

Testing:............................................................................................................................................80

DNS Server installation:....................................................................................................................80

Testing:............................................................................................................................................86

DHCP Installation.............................................................................................................................86

Document and analyze test results:..................................................................................................95

Evaluation and Feedbacks................................................................................................................99

Suggestions for improvements and recommendations...................................................................99

Use of Router......................................................................................................................................99

Use of Firewalls..................................................................................................................................99

Selection of Protocol........................................................................................................................100

Selection of Topology.......................................................................................................................100

А test plаn for the proposed design................................................................................................101

Design implementаtion....................................................................................................................101

Prashna Acharya (First Semester) 6|P a g e


Networking
Pros аnd cons of implemented networks.......................................................................................101

Reflection of design on implemented plan.....................................................................................102

Conclusion........................................................................................................................................102

References:.......................................................................................................................................103

Prashna Acharya (First Semester) 7|P a g e


Networking

Acknowledgement
I am truly thankful, for our teacher, Ruman Thapa, who serves as our networking instructor. His
guidance and assistance throughout this project have been invaluable. His experience, energy and
dedication to teaching have not motivated us. Also provided us with significant support.

Thanks to him we have acquired the knowledge and skills to successfully accomplish this
networking project. His willingness to share his expertise and patiently address our queries has
greatly deepened our grasp of networking principles.

This has enabled us to tackle obstacles and strive for excellence in our work. Your mentorship plays
a role in shaping our development and nurturing a profound understanding of the intricacies of
networking. Your mentorship is an aspect of our journey and we are genuinely grateful, for the
opportunity to benefit from your teachings.

Sincerely,

Prashna Acharya

Introduction
As an IT professional leading the way for DinaTech Solutions branch in Pokhara I am
thrilled to share a plan that reflects our dedication to providing advanced technological solutions and
maintaining strong network infrastructure. Known for our excellent and innovative approach
DinaTech Solution is looking to expand its services to the public in Pokhara by offering a range of
tech devices and applications.

Aligned with our company goals the proposed network setup for the Pokhara branch involves
four departments, each, with roles and infrastructure needs. Through planning and implementation of
an efficient and interconnected network structure our aim is to empower each department to function
efficiently while ensuring the protection of sensitive data and resources. The report will detail the
strategies and actions to be taken to meet the network requirements of DinaTech Solutions, including
establishing both wired and wireless connectivity, implementing robust security measures, and
optimizing data traffic flow. The approach will be based on industry best practices and customized to

Prashna Acharya (First Semester) 8|P a g e


Networking
suit the specific needs of the organization. By carefully strategizing, overseeing, and enhancing the
network system, we are ready to establish a strong base for DinaTech Solution's prosperity in
Pokhara. I firmly believe that our thorough strategy will not just fulfill but surpass the anticipations
of our stakeholders, establishing a fresh benchmark for outstanding network infrastructure
management within the company.

Activity 1
This course will cover networking devices, protocols, and strategies. Topics covered include the
benefits and drawbacks of networking solutions, the influence of network architecture, bandwidth
needs, communication, and how protocols may improve network systems. The gadget functions,
with network security and various servers. In order to guarantee that the network systems may be
utilized within the company, I will also select an architecture.

The primary ideas, topologies, and functional features of various network devices will all be covered
in this section of the formal presentation. At Dinatech Solutions, I serve as both the CEO and Senior
Director of Networks. A topology suited for the current situation is also provided. The presentation
includes supplementary information.

Presentation:

Prashna Acharya (First Semester) 9|P a g e


Networking

Prashna Acharya (First Semester) 10 | P a g e


Networking

Prashna Acharya (First Semester) 11 | P a g e


Networking

Prashna Acharya (First Semester) 12 | P a g e


Networking

Prashna Acharya (First Semester) 13 | P a g e


Networking

Prashna Acharya (First Semester) 14 | P a g e


Networking

Prashna Acharya (First Semester) 15 | P a g e


Networking

Prashna Acharya (First Semester) 16 | P a g e


Networking

Prashna Acharya (First Semester) 17 | P a g e


Networking

Prashna Acharya (First Semester) 18 | P a g e


Networking

Prashna Acharya (First Semester) 19 | P a g e


Networking

Prashna Acharya (First Semester) 20 | P a g e


Networking

Prashna Acharya (First Semester) 21 | P a g e


Networking

Prashna Acharya (First Semester) 22 | P a g e


Networking

Prashna Acharya (First Semester) 23 | P a g e


Networking

Prashna Acharya (First Semester) 24 | P a g e


Networking

Prashna Acharya (First Semester) 25 | P a g e


Networking

Prashna Acharya (First Semester) 26 | P a g e


Networking

Prashna Acharya (First Semester) 27 | P a g e


Networking

Prashna Acharya (First Semester) 28 | P a g e


Networking

Prashna Acharya (First Semester) 29 | P a g e


Networking

Supporting Notes

Computer Network
A computer network is like a big group of computers that talk to each other and share things like
pictures and games. These devices can connect to the network either through physical cables or
wirelessly. Once connected, data is transferred between devices using various communication
protocols like TCP/IP, SMTP, and FTP.

LAN
A local area network (LAN) is like a group of buildings in a neighborhood or office that are
connected together. It is small and usually has around 10 to 100 people using it. Many people can
share and use the network at the same time. In order to share shared resources like printers, hard
discs, and modems, two or more computers may now work together thanks to LANs.

Prashna Acharya (First Semester) 30 | P a g e


Networking

LAN Advantages
1. It offers fast data transfer speeds.
2. Low latency to cut down on device-to-device communication delays.
3. It's simple to organise and run.
4. Both LANs and their components are inexpensive.
5. Since its limited to one place, it's likely more secure.

LAN Disadvantages
1. LANs are not ideal for linking geographically separated places due to their restricted reach.
2. LAN growth is challenging and necessitates network modification, particularly in big enterprises.
3. A local area network (LAN) restricts connections to devices located on the same network.
4. Maintaining and controlling your LAN infrastructure gets more difficult as your network expands.

MAN
The distance between a LAN and a WAN is covered by a MAN. Compared to the LAN, the MAN
offers a higher data rate and range, but not as much as the WAN. The primary distinction between
LAN and MAN is this. WAN and MAN have similar geographic requirements.
MAN Advantages
1. MAN joins many LANs to form a bigger domain.
2. The WAN allows for speedier data transfer.
3. MAN distributes resources, such as servers and data centres, among several sites.
4. Using MAN's extra features might enhance damage recovery performance.
5. Limited LAN coverage and costly WAN infrastructure are balanced by MAN.

MAN Disadvantages

1. MAN design and upkeep are more difficult than LAN design.
2. Installing a MAN may require a sizable infrastructure and leased line.
3. MAN latency is higher than LAN latency but lower than WAN latency.

Prashna Acharya (First Semester) 31 | P a g e


Networking
4. It might be difficult to oversee security at many places inside a single MAN.
5. It is not advisable to connect far or dispersed locations using MAN.

WAN
WAN has coverage larger than LAN and mainly used for cellular applications supporting both voice
and data applications. Larger network covering entire country or state is referred as WANs. Most
WANs are telephone systems.

WAN Advantages
1. WANs provide global connectivity, allowing organizations to connect geographically distant
offices and users.

2. They are highly scalable.

3. They enable centralized control of resources and data which enhances data management and
access control.

4. WANs support remote access for users and devices which facilitates remote work and mobile
connectivity.

WAN disadvantages

1. Investing in file servers and network cabling might be costly.


2. Large-scale network management is challenging, necessitates training, and typically calls for
hiring a network manager.
3. The files on the file server become unavailable in the event of a file server malfunction. If email is
stored on a different server, it can still function. Despite being isolated, the computers may still be
utilised.
4. A computer network can be used to transfer viruses from one machine to another.
Hacking is a risk, especially when using wide-area networks. To stop such misuse, security measures
are required, such as a firewall.

Prashna Acharya (First Semester) 32 | P a g e


Networking

Wired Network
A computer network that is wired is one in which actual cables are used to link devices to one
another. Through the transmission of data signals between equipment like computers, servers,
printers, and routers, these connections provide communication and data transfer. In comparison to
wireless networks, wired networks include benefits including quicker speeds, more security, and
continuous and dependable data transfer. However, since they need physical infrastructure, they are
less flexible and more complicated than wireless networks.

Ethernet Networks:
This particular type of network is widely recognized as the most commonly used for constructing
Local Area Networks (LANs). To create connections between different hardware elements like
switches, routers, and PCs, it uses Ethernet connections, which are usually made of copper. Because
Ethernet networks are dependable and can provide acceptable data transfer speeds, they are ideal for
small to medium-sized enterprises as well as residential settings.

Fiber Optic Networks:


Through tiny glass or plastic fibres known as fibre optic cables, information is sent over fibre optic
networks via light signals. Because these networks can move data quickly, they are frequently used
in wide area networks (WANs) and environments that need rapid communication rates, such as data
centres and big businesses.

Coaxial Cable Networks:


Coaxial cable networks, which were essential in the early development of computer networks and
cable television, are still used sometimes even though they are less prevalent these daysThese
networks use cables with a main carrier and external shielding to improve resistance to intrusion.

Wireless Network
A wireless network is a collection of computers connected without the need of wires. To
communicate between network components, they employ radio waves. This enables roaming within
network range of your device to establish a connection to the network. There are a multitude of

Prashna Acharya (First Semester) 33 | P a g e


Networking
different types of wireless networks, including satellite communications networks, wireless local
area networks (WLANs), wireless sensor networks, terrestrial microwave networks, and telephone
networks. Each of these networks serves a specific purpose and utilizes different technologies to
facilitate communication.

Types of Wireless Network:

WPAN (Wireless Personal Area Network)


 It comprises of a confined region packed with networked gadgets.
 Benefits: reliable, secure network, etc.
 Drawbacks: Few choices, health problems, etc.
 Incorporated into TV, air conditioner, and other gadget remote controls.

WLAN (Wireless Local Area Network)


 Connect individuals to the Internet by connecting two or more devices together.
 Benefits: High data rate, low cost, ease of adding or removing nodes, and more.
 Drawbacks: Cramped quarters, noise from thunder and rain, etc.
 Examples include universities and office structures.

WMAN (Wireless Metropolitan Area Network)


 A wireless network linking several wireless local area networks.

 Advantages: High security

 Disadvantages: Difficult to manage, variable Internet speed, etc.

 Example WiMAXs connection

WWAN (Wireless Wide Area Network)


 It is used to cover large areas such as cities using point-to-point microwave links.
 Benefits: increased data security and worldwide cellular coverage.

Prashna Acharya (First Semester) 34 | P a g e


Networking
 Cons: sustaining a dependable network connection, interference across a large coverage area,
etc.

Hybrid Network
A hybrid network combines many network types, such as wired and wireless, to maximise efficiency
and flexibility by utilising the distinct advantages that each offers. Through the integration of several
network types, including wired and wireless, a hybrid network may maximise its efficiency and
flexibility by utilising the unique benefits of each network type.

Advantages:
1. Hybrid networks offer continual advantages and uninterrupted connection by mixing many
network technologies. Repetitive technologies are used to do this.
2. Organizations can choose to have hybrid networks, which allow them to design their networks
according to the requirements of their specific location or function.
3.They can be cost-effective because organizations can leverage existing infrastructure and adopt
newer technologies to meet changing needs.

Disadvantages:
1. Because of the combination of many network technologies, managing a hybrid network can be
challenging.
2. Because every network type may have unique vulnerabilities that must be handled and guarded,
hybrid networks may provide security problems.
3. To keep a hybrid network operating smoothly and ensuring interoperability amongst various
network components, continuous monitoring and administration are necessary.
4. The quality and design of each network type might affect a hybrid network's performance,
potentially resulting in inconsistent data transfer and user experience.

OSI Model
The Open Systems Interconnection Model, also known as the OSI model, is a theoretical framework
that outlines the operations and interactions within a network system. It provides a set of guidelines
Prashna Acharya (First Semester) 35 | P a g e
Networking
and requirements that enable various hardware and software components to work together
seamlessly. By categorizing communication between computing systems into seven distinct levels,
namely physical, data, network, transport, session, presentation, and application, the OSI model
ensures a systematic and efficient approach to network functionality.

Physical Layer
The physical layer is like the part of a computer system that carries messages from one place to
another. It uses things like cables, wires, switches, and routers to send digital and electrical
messages. It can send messages through different types of physical materials, like copper and fiber
optic cables or even through the air.

Data link layer


The data connection layer helps two devices communicate by breaking up the messages into smaller
parts and checking for mistakes before sending them. It has two parts called the MAC layer and the
LLC layer.

Prashna Acharya (First Semester) 36 | P a g e


Networking

Application layer
This top layer is like the bridge between the internet and the people who use it. It helps us access
websites and use things like a web browser.

Advantages of OSI Model


1. A broader range of models that can be applied to create network models.

2. This model has layers. Changes made to one layer do not affect other layers unless there
are significant changes to the interface between layers.

3. Differentiate between protocols, interfaces, and services. Therefore, it is adaptive in


nature. Depending on the type of network, it is very easy to change the protocols at each
layer.

4. Can handle offline and connection-based services.

Disadvantages of OSI Model


1. It is only a theoretical model; it does not take into account the accessibility of essential
technology. This limits its practical application.
2. This model's release was haphazardly timed. TCP/IP protocols existed even before the advent
of OSI. Thus, businesses initially refused to use it.
3. The OSI model is quite complex. Initial implementation was costly, time-consuming and
complex.
4. Although there are several layers, some of them (for example, presentation and session
layers) have relatively little practical use.TCP/IP Model
Prashna Acharya (First Semester) 37 | P a g e
Networking
TCP/IP is like a special system that helps make sure information gets sent correctly and quickly on
the internet. It helps fix any mistakes and makes sure everything arrives safely.Based on a four-layer
architectural model, the model functions by requiring network protocols for each layer in order to
form the data in the most efficient shape possible for indirect transmission across the network.
In the TCP/IP protocol, there are four different parts that help computers communicate with each
other.

1. Host-to-Network Layer: This is the lowest layer and deals with data transport physically. TCP/IP
is like a magic toolbox that can work with many different rules, but it doesn't have any rules of its
own.
2. Internet Layer: This is like a special set of rules that computers use to talk to each other on the
internet. The main rule is called the Internet Protocol, and it has some helpers called ICMP, IGMP,
RARP, and ARP.
3. Transport Layer: This layer helps make sure that data goes smoothly from one place to another.
It uses protocols called User Data Protocol (UDP) and Transmission Control Protocol (TCP) to do
this.
4. Application Layer: This top layer helps different programs talk to each other. It includes
important ways for programs to communicate, like sending emails, browsing the internet, and
connecting to other computers.

Benefits of TCP/IP:
• It functions without reliance on the operating system.
• It facilitates the establishment or configuration of connections between various PCs,
computer kinds, etc.
• It is capable of autonomous operation.
• The high cable client-server architecture of the TCP/IP paradigm allows for
interorganizational internetworking.

Drawback of TCP/IP:
• TCP/IP is a challenging paradigm to configure, administer, and regulate.
• It's hard to switch out a protocol in TCP/IP.

Prashna Acharya (First Semester) 38 | P a g e


Networking
• It's hard to tell the difference between the terms interface, protocol, and service. It is
therefore improper to describe new technologies in a new network.
• The transport layer in this architecture lacks distinct actions from its services, interfaces, and
protocols; it also does not ensure the delivery of packets.

802.1X
802.1X is a port-based network access control protocol. The use of 802.1X-based user
authentication, which is widely used on networks with strict information security standards, is
referred to as "802.1X authentication".

802.1X Used for:


802.1X authentication is usually suitable for networks with large user scale, newly built networks, or
networks with high information security requirements. The benefits of 802.1X authentication are as
follows:
 802.1X does not use Layer 3 processing; instead, it is a Layer 2 protocol. Therefore, the
performance requirements for access equipment are lower, which reduces network
construction costs.
 In order to maintain service security, a port that is not allowed does not exchange service
packets with clients.

Network Topology
Network topology is a way of referring to the design and positioning of behind-the-scenes
interconnections between systems, devices, and communication links that constitute a computer
network. It consists of both how data moves across these constituents physically and in terms of their
logical structure. The overall layout for data transfer between the computers depends on connections
among nodes and a meshwork for further operation.

Basically, network topology elucidates the arrangement of networking devices as well as their
interaction patterns with one another. This basic structure sets up the operating system controlling
Prashna Acharya (First Semester) 39 | P a g e
Networking
network protocols, communication standards and mechanisms of data transmission. Scalability, fault
tolerance, efficiency and security are some aspects determined by network topologies in the context
of network design and performance especially. Different kinds of network topologies exist.

Types of network topology


Bus Topology
In a bus network, all the devices are connected to one main line called the bus. This line carries
messages from one device to another so they can communicate with each other.

Merits:

• It’s easy and low-cost to implement.


• It is well-suited for small networks with few devices.

Demerits:

• Signal degradation and collisions happen especially as the network expands or grows larger
• This network type has limited troubleshooting capability due to its design
• It also limits cable length and number of devices.

Ring Topology
In a ring topology, all the connected nodes form a circle where data can only travel in one direction.
Each node is connected to two other nodes, creating a circular path for the data to follow until it
reaches its destination.
Merits
• There are no collisions in the data transmission process.
• It has a homogeneous, basic structure.

Demerits
• The network could come to an end if one node malfunctions.
• Unable to modify nodes without interfering affecting the network's functionality.
• There are limits to its scalability.

Prashna Acharya (First Semester) 40 | P a g e


Networking

Star Topology
In a star architecture, each node is connected to a special device called a hub or switch. This central
device is required to be used for all data transfer between the nodes. Nodes are not directly
connected to one another.
Merits:

• Control and management are centralised.


• Each connection is independent, making it easy to diagnose problems and isolate them.
• Scalability: Other network sections will not be affected with the addition of new nodes.

Demerits:

• The whole network can collapse if there is failure in the central device which itself generates
dependence on it.
• More cabling is required for this type of topology than in others.
• Limited separation between the nodes.

Mesh Topology
A many-to-many connection is formed when every device on the network is linked to every other
device using a mesh architecture. It connects directly to other things. There are several methods for
transferring data between computers. It lacks a switch, hub, or any other central computer that serves
as a hub for communication. One example of a mesh topology is the Internet.
Merits:

• High performance and error: If a link or node fails, an alternate path can be used.
• Scalability: Additional nodes can be installed easily without too much trouble.

Demerits:

• The high implementation costs were a result of the quantity of linkages.


Requires more structure and cables
• Is challenging to build, implement, and administer.

Prashna Acharya (First Semester) 41 | P a g e


Networking

Tree Topology
Devices are arranged hierarchically in a tree topology, with a central device—a router or switch, for
example—acting as the tree's root and additional devices branching out from it. A tree topology is
like a tree with branches. All the other parts are connected to the main part, which makes a
hierarchy. It needs to have at least three levels.
Merits:

• Centralised control and administration.


• Large networks with several branches may be supported it is adaptable and expandable.
Demerits:

• The network's dependence on root nodes means that when one fails, the entire system fails.\
• Difficult to establish and oversee.
• Constrained by a system of rank.

Hybrid Topology
Hybrid topology refers to the merging of multiple distinct network topologies. When two or more
different topologies are integrated, a hybrid topology is formed, whereas connecting similar
topologies does not produce a hybrid topology.
Merits:

• It's simpler to modify the network to meet unique needs.


• Different topologies can be coupled to provide additional benefits.

Demerits:

• Adds complexity when many topologies are integrated.


• To guarantee the best coverage, meticulous planning and administration are needed.

Communication
The exchange of information, concepts, sentiments, and thoughts among people, groups, and
organizations is known as communication. It is a fundamental component of human connection and

Prashna Acharya (First Semester) 42 | P a g e


Networking
is significant in a variety of spheres of life, including as social interactions, commercial dealings,
interpersonal relationships, and education. Communication can take place in a variety of forms, such
as through the use of language, both written and spoken, as well as through nonverbal cues like
gestures and facial expressions. Additionally, digital media has become an increasingly popular
method of communication in today's technological age.

Advantages:
 Using a common way to talk to each other on the internet, like TCP/IP, can help make
networks work better together.
 Each type of job on the internet, like sending emails or browsing websites, uses its own
special way to communicate.
 Sometimes, making sure phone calls or video chats go first can make the internet faster for
everyone.

Disadvantages:
 Using different ways to talk to each other can make things more complicated and harder to
take care of on the internet.
 Sometimes, talking with our voices or through videos can be made faster by making it more
important than other things.

Bandwidth Requirements

Prashna Acharya (First Semester) 43 | P a g e


Networking

Networking Principles

Performance: In order to satisfy user and application demands, the network must monitor length,
speed, and availability. Droduction-related efficiency. This requires the best network design,
bandwidth allocation, and resource utilisation to prevent bottlenecks and delays.
Security: In a network, security is really important to make sure that only the right people can
access it and to keep it safe from bad guys. There are different things we do to make this happen,
like using special walls called firewalls, having rules about who can get in, locking information with
secret codes, checking if someone is who they say they are, and always checking to make sure
everything is still safe.
Prashna Acharya (First Semester) 44 | P a g e
Networking
Modularity: The way the network is set up works well together and everything fits together nicely.
Assign and complete assignments and tasks into distinct levels or portions. This adaptable design
enables modifications to individual components without impacting the network as a whole, hence
promoting flexibility, scalability, and sustainability.

Layered Architecture: The TCP/IP and OSI systems both organize the different jobs that a network
needs to do into different categories. To encourage interoperability and abstraction, each layer
carries out certain functions and communicates with other levels via defined protocols and
interfaces.

Fault Tolerance: Networks have to be built to withstand errors and bounce back quickly. Among
the fault tolerance strategies that provide uninterrupted operation while lessening the impact of
hardware or software failures are redundancy, load balancing, and failover.

Network Protocol

Prashna Acharya (First Semester) 45 | P a g e


Networking

Networking Devices
Network equipment is equipment that manages communication and data transfer on a computer
network. These gadgets are crucial for ensuring network security, arranging data transit, controlling
traffic, and connecting devices. Various network devices perform different tasks within the network
infrastructure to promote reliable and effective operation of the network. Typical network equipment
includes:

3. Access Point (AP):

Prashna Acharya (First Semester) 46 | P a g e


Networking
Devices known as access points are those that give other devices connected to a network wireless
communication, eliminating the need for physical cords. They act as links between wired and
wireless networks, carrying data between wireless devices and the wired network backbone.

4. Modem:

Modems help computers talk to each other by changing their messages into a form that can travel
through phone lines or cables. They convert the analogue signals back into digital data at the other
end by demodulating them.
5. Firewall:

One kind of tool for network security is a firewall. In accordance with predefined security
requirements, keep an eye on and manage all network traffic, both entering and leaving the system.
They serve as barriers that keep malware, illegal access, and other online hazards out of trustworthy
internal networks and untrusted external networks like the Internet.
6. Hubs

Network devices are connected to each other using hubs, which help send information in different
ways. Digital information is sent in small packets, while analogue information is sent as a signal.
Hubs can also help make the signal stronger if it gets weaker over long distances. Hubs work at the
bottom level of a system called OSI.

Prashna Acharya (First Semester) 47 | P a g e


Networking

Network Server
A network server is like a really powerful computer that helps other computers in a group share and
use things together. It's kind of like a leader that helps them all work together. A network server, as
opposed to a standard workstation, is devoted to managing network functions including email
processing, data storage, and application hosting. The following are some typical kinds of network
servers:
1. Web server: Stores and provides clients with access to web pages over the Internet or
intranet, as well as provides web pages that users request when they visit the website.

2. File server: Specifically designed for file management and storage, this network-based
tool allows users to save, retrieve, and exchange files—a necessary feature for collaboration
and data access.

3. Database server: Manages client requests and serves as the database's host. For the safe
and effective administration of massive volumes of data utilized in business contexts, this is
crucial.

4. Mail server: Oversees and enables email correspondence, maintains email records,
handles both inbound and outbound messages, and guarantees the safe and effective
transmission of emails.

5. Application server: It host and manage certain programs and make them accessible to
network users, offer a framework for administering software, services, or applications.

6. Domain name system (DNS) server: This technology helps people visit websites by
typing in easy names instead of long numbers. It changes the website names into numbers.

Access Permissions
Access permissions are like rules that decide what a person or a group of people can do on a
computer or network. These rules determine how much control or access they have over things like
files, folders, or programs. The activities that users are permitted or prohibited to take on particular

Prashna Acharya (First Semester) 48 | P a g e


Networking
system objects or data depend on these permissions. In computing systems, access permissions are
essential for maintaining data integrity, security, and privacy.
Different degrees of access are usually included in access permits, such as:

Read: Permits users to access a file or directory's contents, but not edit or remove it. Files may be
opened, their contents seen, and copies made to other places by users with read access.

Write: Permits users to alter or edit a file's, directory's, or resource's contents. Write-permission
holders are able to add, modify, and remove any files, folders, or data that they contain.

Execute: Allows users to use and run programs, scripts, or files that make things happen on a
computer. You need permission to do this on most computers so that you can use and run different
things.

Prashna Acharya (First Semester) 49 | P a g e


Networking

Relation between network hardware and software:

This software is like the special instructions or rules that your toys need to follow when they play
together. For everything to work properly, the operating system needs to have all the right tools and
instructions. These tools are like the services and protocols that the operating system provides. They
help your toys communicate and do their jobs in the network. Lastly, because the device is
connected to the network correctly, network software enables workstations to function effectively
and safely while conforming to network standards and services. In order for the network to work
correctly, the device and the computer need to work together.

Workstation hardware:

Prashna Acharya (First Semester) 50 | P a g e


Networking

Range of Servers
There are many servers in the market. They all have unique qualities and operate in distinct
ways. A list of several of them is provided below, along with a comparison table showing their
qualities.

• Power Edge T340

• Think System ST550

• Think System ST650 V2

Prashna Acharya (First Semester) 51 | P a g e


Networking
Now let us learn about their specifications and some amazing features.

1. Think System ST650 V2

Lenovo Company manufactures a tower server called the Think System ST650 Tower Server It uses
two Intel Xeon Scalable processors from the third generation, each of which has the capacity to
support up to 36 cores and 250W of power. It can accommodate 32 GB of RAM. With its eight
DIMM channels, DDR4 at 3200 MHz is supported. This is a special computer that can hold a lot of
information, like games, pictures, and videos. It likes to use certain types of software to work, and it
lists for about $3200.

2. Think System ST550

Lenovo Company manufactures a tower server called the Think System ST550 Tower Server. Two
Intel Xeon Platinum 2nd generation processors, each capable of supporting up to 22 cores, 3.8 GHz
core speeds, and 125W of power, are used in it. It has 32 GB of RAM capacity. Its twelve DIMM
channels support DDR4 at 2666 and 2933 MHz. It has a storage capacity of up to 768GB. It lists for
about $2000.

3. Power Edge T340

Selection of Best Server


After a thorough analysis and interpretation of the chart, we determined that the Think System
ST650 V2 would be the best server to install in our networking system. Because the network
architecture we built required more sophisticated processing capabilities, this server was perfect for
it. Additionally, compared to earlier servers, it had greater RAM and quicker processing as well as
more sophisticated memory features

Prashna Acharya (First Semester) 52 | P a g e


Networking
Compared to competing servers, the Think System ST650 V2 boasted superior processing features.
Additionally, it possessed a large amount of RAM—32 GB. Given the age of Windows, the
Windows operating system was used in its design. Therefore, a server that could support Windows
OS was needed, and the ST650 V2 server met that need. Despite having all these cutting-edge
technologies built in, the ST650 V2 server had one drawback in terms of price compared to
comparable servers. However, after discussing the server's budget with the DinaTech head manager,
we ultimately chose to overlook the financial drawback and select this server as the finest server for
their network system.

Selection of Best Topology


A topology is a structure or arrangement, while a network topology is a collection of devices linked
together. It is important to understand what types of topologies work and which topologies meet the
system requirements of the network. That topology was covered in the last report.

In our network system, we employ a tree topology. This topology's primary feature is that the
total number of nodes that comprise the network is infinite. A high number of nodes is needed since
we are building a network for a computer service system, which is often a huge network. But this is
not an issue because of the topology's nature. The most crucial components of any organisation,
particularly in the financial industry, are data, records, and information. As a result, enterprises place
a high premium on data security.

The network's data loss can be minimised using this topology. The main advantage of this
topology is the amount of network that financial network systems can use. You don't need additional
network equipment to expand your network. Also, since the company has four offices, a tree
topology helps create a smaller monitoring network for each office. Also, even if there are problems
in the network, it is easier to find components in one topology than in other topologies. Another
important feature of this topology is that there are few constraints. Topology maintenance is
difficult, but it is not a big problem because we hire experts. As a large network and IT services
organization, network installation and maintenance costs are not an issue for this organization.
Therefore, we conclude that tree topology has many advantages and features that match or meet the
system requirements of network systems. Also, there are fewer restrictions and the current

Prashna Acharya (First Semester) 53 | P a g e


Networking
restrictions are not a major issue. Therefore, we chose the tree topology because of the information
and reasons mentioned above.

Selection of Best Protocols


A network protocol is a predetermined set of guidelines that specify how a network's constituent
parts interact with one another and transfer data. If a network protocol is missing or not in use, the
network cannot function or its components can communicate with each other. The network DNS
protocol is important because it is used to translate URLs entered by users into words recognizable
by pages (IP addresses) to access the web pages they want.
The DHCP protocol helps give each device on a network its own special number, kind of like
how a teacher gives each student in a class their own seat. By doing this, the operators may save
time by not having to manually assign IP addresses to every single network component. The
application of
TCP and IP protocol was the next protocol utilized in the network system. IP protocol is used
when the sender and recipient have established a connection (handshake) using TCP protocol. IP
protocol ensures that data packets are directed or routed to the appropriate location by addressing the
packets following connection setup. They function as the foundational ideas of an internet
connection when combined. Therefore, TCP/IP protocol will enable users and employees to transmit
and receive data, send messages, and utilize the internet anytime they so want.
In the bank network system, HTTPS protocol was utilized. Encouraging more secure network
connection is its primary goal. This contributes to the bank network's increased strength and
difficulty of penetration. The network operator or employee does not need to be concerned about
network security because this protocol also employs encryption with TLS.

These four protocols were selected and implemented in the IT Service system for the reasons listed
above, along with their respective functions. Despite having distinct responsibilities and functions of
their own, they cooperate to improve network connectivity and the overall effectiveness of the bank
network system.

Prashna Acharya (First Semester) 54 | P a g e


Networking

Conclusion
We learned about various online tools and tools. Computers and protocols and their role in networks.
Therefore, we changed the important parts of this report and decided to choose one of the best IT
service providers. After detailed research and interviews with bank senior management, we decided
to choose the ST650 V2 system concept as the best server for the financial system. After that, we
selected 4 methods and a good topology that may be needed in the Internet (i.e. tree topology) to
make network communication more efficient. Finally, after combining all these elements in the
report, we are ready to move on to our next statement, which includes all the knowledge and related
documents of this concept (building a financial system).

Activity 2:

Introduction
DinaTech Solution is a Bhaktapur-based IT service company. It has long since been offering its
services to the people of Nepal. The business has made the decision to build a new branch with state-
of-the-art machinery and software in Pokhara. There are four main divisions within the sector, each
with its own set of duties and infrastructure. The personnel in each department and their tasks have
already been determined by the central office. After the new branch started, the organization started
helping people in Pokhara.

In Activity 2, I want to use the best design tools to make a network that works well for DinaTech
Solution. I will also plan how to take care of the network, set up devices, make sure it's secure, and
follows the rules. I will make a plan to test the network and make sure it works the way it should. I
will listen to what users want too.

Evidence of implemented network.


I am working at a company called DinaTech Solution as a computer expert. We created a plan for
how all the computers in the company will be connected to each other. We utilised a unique
technology called Cisco to enable all of the computers and gadgets to function as one. This tool
makes everything more connected. Additionally, we assigned each device an IP address, which is a

Prashna Acharya (First Semester) 55 | P a g e


Networking
unique number. Their communication is facilitated by this number. We selected several server and
device kinds for various tasks, such as user tracking and internet connectivity support.

Network Design

Implementation of designed network system


To help DinaTech Solution, we made a special computer network using Cisco Packet Tracer. We
looked at what the company needed and made sure each part of the network was set up correctly.
We used the layout of the Pokhara branch's network as a guide for the other branches. By making
each branch's network fit their specific needs, the company can work better and save time and
money. To address the specific requirements of DinaTech Solutions, a virtual network solution was
created using Cisco Packet Tracer to build and configure every network component. The company's

Prashna Acharya (First Semester) 56 | P a g e


Networking
goals and objectives were carefully considered when evaluating the devices used in different
departments. The decision was made to adopt the network layout of the Pokhara branch as the
model for all divisions. By tailoring the network to meet the unique needs of each department, the
company can guarantee that its IT infrastructure is optimized for peak performance and
productivity.

System requirement
The following set of criteria was defined based on the scenario that was applied.

IT Department: 6 PC

Finance Department: 5 PC

HR Department: 4 PC

Step 1: Open Cisco Packet Tracer.

Step 2: Put a router in it.

Prashna Acharya (First Semester) 57 | P a g e


Networking

Step 3: Connect PCs to each switch in first.

Prashna Acharya (First Semester) 58 | P a g e


Networking
Step 4: Set up a router to connect the several networks that switches have connected. The gateway
has been employed by us to create links between the different networks.

Prashna Acharya (First Semester) 59 | P a g e


Networking

Step 5: Link the PCs and servers with router through switch.

Prashna Acharya (First Semester) 60 | P a g e


Networking

Step 6: Test the configuration using ping on each PCs command prompt.

Step 7: Now connecting the access point to each team.

Process of access point:

Prashna Acharya (First Semester) 61 | P a g e


Networking

Process of connecting access point in laptop:

Prashna Acharya (First Semester) 62 | P a g e


Networking

Network design after configuring access point:

Step 8: Allocating DHCP

Prashna Acharya (First Semester) 63 | P a g e


Networking

Step 9: Access any networked computer, click on the desktop, and choose the IP configuration
option to test the DHCP server. After selecting the DHCP option, a new IP address will be assigned
by the system automatically.

Prashna Acharya (First Semester) 64 | P a g e


Networking

Prashna Acharya (First Semester) 65 | P a g e


Networking
Step 10: Setting up DNS, DHCP and Web Servers.

Prashna Acharya (First Semester) 66 | P a g e


Networking

Step 11: Firewall Setup

Choose the server location first, then go to the desktop part and choose the Firebase option to start
configuring Firebase. After that, follow the guidelines to put the necessary security measures into
place.

Prashna Acharya (First Semester) 67 | P a g e


Networking
In this project, we developed an example for the DinaTech solution network using a range of
components. The three departments that comprise the overall network are the finance, HR, and IT
departments. Each division consists of several components, each of which plays a unique purpose in
the overall network that has been briefly explained. The network diagram we came up with is shown
above.

Testing:

Prashna Acharya (First Semester) 68 | P a g e


Networking

Networking Devices Used in DinaTech IT Solution


1.Routers

Routers play a crucial role in the seamless transmission of data packets across numerous
interconnected networks within a larger network. Additionally, routers facilitate the sharing of a
single public IP address among multiple devices, offering the advantage of selecting a server that
offers optimal cost-effectiveness and performance.

Prashna Acharya (First Semester) 69 | P a g e


Networking

4.
Subnetting

To make it easier to take care of a big network, we can split it into smaller parts using a method
called subnetting.

5. Access Point

n access point is like a special tool that helps you connect to the internet or other devices in a
network. It can be a small thing you hold or even something that exists inside a computer.
6. IP Addressing

An IP address is like a special number that devices use to talk to each other on the internet, just like
people use phone numbers to talk to each other on phones. This table shows the different parts of our
department's internet connection, like addresses and settings.

IP Configuration
You can use a tool called ipconfig on a Windows computer to see information about how it's
connected to the internet. When you run ipconfig, it shows you details like your IP address and how
your computer is connected to the internet.

Prashna Acharya (First Semester) 70 | P a g e


Networking

Feedback Form
DinaTech Solution's new branch in Pokhara needs feedback to help them build their network system
well. By actively collecting user input, IT personnel may identify unexpected issues or challenges
that user may have while utilizing the technology for the first time, allowing for speedy adjustments
and preventing any disruptions.

User Feedback:

Prashna Acharya (First Semester) 71 | P a g e


Networking

Prashna Acharya (First Semester) 72 | P a g e


Networking

Prashna Acharya (First Semester) 73 | P a g e


Networking

Evaluation of the system:


We evaluate the DinaTech computer system's dependability and performance to make sure it can
accommodate several users concurrently without experiencing any issues. Furthermore, we employ
certain security protocols to guarantee that private data is shielded from any breaches. The domain
controller allowed only authorised users to access particular resources, such files and documents. A
DHCP server gives each computer a special number so they can connect to the internet easily.
Instead of remembering long numbers, a DNS server gives us shorter names to find websites.
Additionally, a firewall was put in place between the office's router and Internet connection to block
outside influence on the network.

Аnаlysis of user feedbаck to optimize designs аnd improve efficiency of


connected solutions:
To improve the design of linked solutions and boost their efficacy, user input analysis is essential.
The data that users supply aids in the prioritization of critical issues, the identification of potential
areas for system improvement, and the provision of a usability overview. First, we use social media,
reviews, and polls to find out what people think about our product. We hear comments, both positive
and negative, to learn about people's emotions. Next, we assign a score to each review based on
factors including the product's ease of use, security, and online functionality. It is simpler to
determine what matters most when patterns and trends are recognized thanks to this classification.

Concerns are ranked according to severity and frequency once the inputs have been classified, with a
focus on issues that are reported often and have a major effect on the user experience. After
identifying the most critical problems, workable fixes for each problem must be identified. Among
the things that need to be addressed are the speed, security, usability, and clarity of the internet. We
select the concepts that have the most potential to improve people's lives, and we do thorough testing
to ensure their viability. This might entail evaluating them online and seeing how well they function
with actual users.

In order to ensure that solutions work effectively and do not cause any issues, it is important to
thoroughly test them. The combined solution is modified based on feedback and checked for any

Prashna Acharya (First Semester) 74 | P a g e


Networking
negative impacts on security or functionality. We will set up a way to always listen to what users
think about our system and make it better. Analysing customer feedback is critical because it enables
us to identify areas for improvement and implement changes that will ultimately increase user
satisfaction.

Regular Maintenance Plan

Prashna Acharya (First Semester) 75 | P a g e


Networking

Maintenance of Day 1

Maintenance of Day 2

Prashna Acharya (First Semester) 76 | P a g e


Networking

Maintenance of Day 3

Our networked system will continue to function as intended and won't experience any unplanned
outages if we follow the maintenance schedule.

VMware Workstation Implementation

Domаin Controller (DC):


A domain controller is like a special computer that keeps everything secure in a group of computers.
It helps people and other computers connect to resources like files and programs in that group. Put
differently, DC stands for dominant controller. All of the hardware and software resources on your
network are housed on one primary server computer. Among its duties are the installation,
configuration, and management of several security mechanisms that monitor network access.

Steps to Configure AD DS in VMware:

1. Install VMware, then add Windows Sever 2012 in it and open it.

Prashna Acharya (First Semester) 77 | P a g e


Networking

2. From the network properties, choose Ethernet0, disable IPV6, and then assign IPV4.

3. Write DinaTech in the computer name.

Prashna Acharya (First Semester) 78 | P a g e


Networking

4. In the Server Manager Panel, select "Active Directory Domain Service"

5. After the installation, restart the server to complete the process.

Prashna Acharya (First Semester) 79 | P a g e


Networking

6. Following installation, choose "Promote this server to domain controller" by clicking the flag
symbol (as shown in the figure):

7. Click Next after selecting Add a New Forest.

Prashna Acharya (First Semester) 80 | P a g e


Networking

8. Put in your password and click next.

Prashna Acharya (First Semester) 81 | P a g e


Networking
9. When the install button appears, click install.

Windows will automatically restart after installation.

11. Next, open server manager and choose the Tools menu's Active Directory Users and Computers
option.

Prashna Acharya (First Semester) 82 | P a g e


Networking
12. You may right-click on the newly generated user unit to create users and groups.

13.Add user information and give a new password.

14. Enter a group name, then choose OK.


Prashna Acharya (First Semester) 83 | P a g e
Networking

15. By clicking on the group to which we wish to add a new member, we can now add the new user.
Next, choose the member area and press the "Add" button, as seen in the picture.

Prashna Acharya (First Semester) 84 | P a g e


Networking

Testing:
After the setup is finished, we must evaluate its success. We might use ping or examine the server
management data to be sure. Press Enter after typing "ping "domain name" into the command
prompt. The procedure is finished if this produces a result.

DNS Server installation:


Step 1: In Manager Server, select the Add roles and features option.

Step 2: Next, configure the DNS server.

Prashna Acharya (First Semester) 85 | P a g e


Networking

Step 3: Click the Tools menu and choose DNS once the installation is complete.

Prashna Acharya (First Semester) 86 | P a g e


Networking
Step 4: To choose the new zone, right-click on the forward lookup zone.

Step 5: Next, choose Next, provide the scope's name, and supply the beginning and terminating IP
addresses in the ensuing wizard.

Step 6: To finish installing the forward lookup zone, click Finish.

Prashna Acharya (First Semester) 87 | P a g e


Networking

Step 7: To continue, repeat the previous method's steps: right-click on the Reverse Lookup Zone,
select New Zone, and then click Next.

Step 8: Click Next once IPv4 has been chosen.

Step 9: After entering the network ID, click Next to proceed.


Prashna Acharya (First Semester) 88 | P a g e
Networking

Step 10: Next, right-click in DNS Manager on the website inside the forward lookup zone, and
select New Host (Α or AAАА) from the menu.

Step 11: After entering the IP address and selecting www as the name, click Add Host.

Prashna Acharya (First Semester) 89 | P a g e


Networking

Step 12: Interface will show like this after completing the method.

Prashna Acharya (First Semester) 90 | P a g e


Networking

Testing:
By utilising Command Prompt and pinging the server using its name or IP address, we can verify the
DNS server.

DHCP Installation
Step 1: In the Server Manager window, select Manage, then Add Roles and Features.

Prashna Acharya (First Semester) 91 | P a g e


Networking
Step 2: Click next until server selection roles appears.

Step 3: Choose DHCP server.

Prashna Acharya (First Semester) 92 | P a g e


Networking
Step 4: Click install after completing the process.

Step 5: Select DHCP from the tool manager on the server.

Step 6: Right-click on the machine name to approve it.

Step 7: Select IPv4 from the right-click menu, then select New Scope and Next.

Prashna Acharya (First Semester) 93 | P a g e


Networking

Step 8: Click Next after entering the scope name.

Prashna Acharya (First Semester) 94 | P a g e


Networking
Step 9: Enter the IP address range.

Step 10: Click next.

Prashna Acharya (First Semester) 95 | P a g e


Networking
Step 11: Select "Next" after entering the duration.

Step 12: Select Yes and click next.

Prashna Acharya (First Semester) 96 | P a g e


Networking

Prashna Acharya (First Semester) 97 | P a g e


Networking

The server and the client are on the same local area network.
Proceed to the Network and Sharing Centre, choose Local Area Connection, and then select
Properties. then select "Get IP address automatically." By doing this, you can make sure the DHCP
server is running correctly. The IP address is assigned inside the range mentioned above, as seen in
the picture.

Prashna Acharya (First Semester) 98 | P a g e


Networking

Prashna Acharya (First Semester) 99 | P a g e


Networking

Document and analyze test results:


Testing: ping from IT Department to HR Department
S.N Test Expected Result Real Result Remarks
1. The IT Success
Department's
first PC pings
the second
computer in
the finance
department.

The testing between the computers in the finance and IT departments goes quite well, with no errors
or improper settings.
Prashna Acharya (First Semester) 100 | P a g e
Networking

Testing: Data Transfer Testing


S.N Testing Expected Result Real Result Remarks
1. One Success
department's
computer
cannot
connect with
or exchange
data with
another
department's
computer.

After using Access Point

Testing: ACL Block


S.N Testing Expected Result Real Result Remark
s
1. mail from Success
the IT
department
being
obstructed
to reach
another
department

Prashna Acharya (First Semester) 101 | P a g e


Networking

Testing: Web Server


Test Expected Result Real Result Remarks
The web Success
server needs
to make the
website we
built using the
domain name
or URL
provided in
the web
browser
accessible.

Testing: Domain Name and IP Address


Test Expected Result Real Result Remarks

Testing: DNS
Test Expected Result Real Result Remark
s

Prashna Acharya (First Semester) 102 | P a g e


Networking
The domain Success
must
automaticall
y find itself
and use the
DNS to
deliver
results.

Testing: DHCP
Test Expected Result Real Result Remark
s
When new Success
users join the
same
network, IP
addresses
should be
assigned by
the DHCP
server
automatically
.

Prashna Acharya (First Semester) 103 | P a g e


Networking

Evaluation and Feedbacks

Suggestions for improvements and recommendations.


I provide suggestions as an IT specialist to improve DinaTech IT Solutions' network infrastructure.
These suggestions will be expanded upon in the paragraph that follows, once the different network
configurations have been evaluated.

Use of Router
It has several advantages, including enhanced performance, security, scalability, and dependability.
DinaTech Information Technology Solutions. The network architecture for the Pokhara Branch has
been implemented, and a careful analysis of it might yield important insights for enhancing the
system further. The effective installation of networking infrastructure emphasizes the significance of
both protocol selection and network layout.

Use of Firewalls
A firewall is a crucial security mechanism that improves computer networks by examining data
packets in order to stop malicious software and stop illegal access. Among its advantages are

Prashna Acharya (First Semester) 104 | P a g e


Networking
enhanced distant connectivity, increased network security, virus protection, application usage
management, and intrusion deterrent. Because they block unauthorised access and only permit
authorised traffic to enter and exit the network after thorough examination, firewalls are essential for
network security. I've produced a polished document that advocates for a better strategy for this task.
The setup procedure, software, and system requirements are all explained in this article.
Additionally, it evaluates the test findings and contrasts them with the anticipated results in order to
convince others to accept the optimised design by showcasing its advantages.

Selection of Protocol
Network protocol is a collection of rules that controls how data is transmitted and communicated
inside a network. Without network protocols, a network would not be able to function. There are
many protocols used in networks, chosen based on the network's objectives and requirements.
HTTPS protocol is used in the bank network system to enhance security through encryption with
TLS. These protocols were chosen for their unique roles and functionalities, working together to
facilitate effective communication and improve the efficiency of the bank network system. DNS
protocol translates user-entered URLs into IP addresses to enable access to desired webpages. The
DHCP mechanism saves time by automatically assigning IP addresses to network components. TCP
and IP protocols work together to establish connections and ensure data packets are correctly routed
to their destinations, serving as the foundation for internet connections.

Selection of Topology

Prashna Acharya (First Semester) 105 | P a g e


Networking

А test plаn for the proposed design


Additionally, we created a strategy for network testing. We effectively addressed and fixed every
issue that was found after carefully examining how the network operated. In addition, we have
developed a thorough maintenance plan that will guarantee the network's seamless functioning and
avert any future malfunctions. This maintenance schedule covers a variety of tasks, including
computer maintenance, network equipment upkeep, security upgrades, and server maintenance. It is
intended to be carried out on a regular basis. To ensure a systematic approach, we have divided the
maintenance schedule into four distinct sections. In addition to these measures, our test plan involves
conducting audits, performing penetration testing, and executing various other tasks to guarantee the
network's optimal performance and security.

Design implementаtion
We accomplished the plan by utilizing a standard topology for communication and centralizing the
network with the aid of domain controllers. In order to safeguard the network from potential dangers
and prevent unauthorized entry, a firewall was installed. Alongside this, a router was incorporated to
establish connectivity between two distinct networks. Furthermore, the switch was employed to
connect the router with numerous servers and client PCs. The DHCP server played a crucial role in
assigning dynamic IP addresses to the client PCs. To efficiently handle printing tasks from the client
PCs, a few printers were designated as print servers. Moreover, a VPN server was employed to
ensure secure data transmission and protect against data theft. Additionally, WDS servers were
configured to streamline the process of updating operating systems for staff members, eliminating
the need to access computer files.

Pros and cons of implemented networks


This network offers several benefits. There are multiple advantages to utilizing this network. With
centralized control, administrators can easily impose restrictions or regulate the speed of data
transmission. The use of a VPN ensures that data transfer over the network is highly protected. The
inclusion of a firewall on your router has greatly improved both the speed and security of your
network. In the event that your headset malfunctions, you may locate it instantly and solve the issue
with ease. The drawback of this network is that your health can still be harmed even if your data is
shielded by several layers of security. The network as a whole will malfunction if the central device
Prashna Acharya (First Semester) 106 | P a g e
Networking
fails. Because the network is centralised, all of Maize's data and information would be accessible to
anyone who manages to break into her PC.

Reflection of design on implemented plan


I combined a router with several other elements to establish a fundamental network setup. In
addition to offering more ports for expansion in the future, this design effectively linked all required
equipment. I set up a static routing technique to ensure the network's dependability and effectiveness
in transporting big volumes of data and packets in order to satisfy my particular requirements. In
order to maximise efficiency, my network employs a star topology, which combines several
integrated network topologies with packet transfer methods. The system has to be updated often to
take advantage of new technological developments.

Conclusion
During this particular task, I discussed my process for selecting the most suitable design for my
project. I elaborated on the program that I utilize for this purpose. I used to construct the system and
the system I designed. I described the testing, setup, and a comparison of the predicted and actual
outcomes. Finally, using the data I had acquired, I suggested a few modifications that might be done
to enhance the design. Rephrase it in a clear and original manner.
The system has undergone extensive testing and analysis. Furthermore, we established a
detailed maintenance plan to assist in the management of the network in the future. The feedback
provided by network users was highly praised and taken into consideration. The network design
effectively meets the needs of the organization. Users find the system to be user-friendly, easily
manageable, and simple to maintain. By implementing a virtual private network server, secure data
can be transmitted between the main office and satellite locations. In my role as the network
administrator at Landmark IT, I successfully and effectively established the essential servers
required for safeguarding data, seamlessly allocating IP addresses, and facilitating numerous other
functionalities.

Prashna Acharya (First Semester) 107 | P a g e


Networking

References:
Yasar, K. and Gillis, A.S. (2023) computer
network. https://www.techtarget.com/searchnetworking/definition/network.

Petryschuk, S. and Petryschuk, S. (2021) What is the OSI Model?


https://www.auvik.com/franklyit/blog/osi-model-explained/.

Keary, T. and Keary, T. (2024) Network Topology: 6 Network Topologies Explained & Compared.
https://www.comparitech.com/net-admin/network-topologies-advantages-disadvantages/.

Chaudhari, R. (2022) 'Communication Protocols - Ruchita Chaudhari - Medium,' Medium, 1 July.


https://medium.com/@ruchita.chaudhari20/communication-protocols-16089452cd3c.

Lee, M. (2023) Essential networking principles for developers.


https://www.linkedin.com/pulse/essential-networking-principles-developers-moonhee-lee-rwjde.

Cyberithub (2022) An introduction to basic networking concepts and principles | CyberITHub.


https://www.cyberithub.com/an-introduction-to-basic-networking-concepts-and-principles/.

Zhang, P. (2010) 'Networking devices,' in Elsevier eBooks, pp. 429–463.


https://doi.org/10.1016/b978-1-4377-7807-6.10011-7.

Keary, T. (2023) '9 Types of network protocols & When to use them,' Forbes Advisor, 10 August.
https://www.forbes.com/advisor/business/types-network-protocols/.

Biggs, J. (2023) 6 factors when choosing a network Topology - Meldium.


https://www.meldium.com/6-factors-when-choosing-a-network-topology/.

Perlmutter, W. (2024) Best 13 Feedback Form Examples and Templates [2024 update].
https://usersnap.com/blog/feedback-form/.

Prashna Acharya (First Semester) 108 | P a g e

You might also like