Networking Assignment
Networking Assignment
FACULTY OF COMPUTING
ASSIGNMENT COVER SHEET
This form is to be completed by students submitting assignments of level 4 and level 5.
Students are required to complete all sections and attach to your assignment.
STUDENT DETAILS
STUDENT ID [email protected]
SUBMISSION
1. I declare that:
a) this assignment is entirely my own work, except where I have included fully-documented
references to the work of others,
b) the material contained in this assignment has not previously been submitted for any other
subject at the University or any other educational institution, except as otherwise
permitted,
c) no part of this assignment or product has been submitted by me in another (previous or
current) assessment, except where appropriately referenced, and with prior permission
from the Lecturer / Tutor / Unit Coordinator for this unit.
2. I acknowledge that:
a) if required to do so, I will provide an electronic copy of this assignment to the assessor;
b) the assessor of this assignment may, for the purpose of assessing this assignment:
I. reproduce this assignment and provide a copy to another member of academic
staff;
II. communicate a copy of this assignment to a plagiarism checking service such as
Plagiarism Check (which may then retain a copy of this assignment on its
database for the purpose of future plagiarism checking).
I am aware of and understand that any breaches to the Academic Code of Conduct will be
investigated and sanctioned in accordance with the College Policy.
Table of Contents
Acknowledgement................................................................................................................................3
Introduction..........................................................................................................................................3
Activity 1...............................................................................................................................................4
Presentation:........................................................................................................................................4
Supporting Notes...............................................................................................................................25
Computer Network............................................................................................................................25
LAN.................................................................................................................................................25
LAN Advantages.........................................................................................................................26
LAN Disadvantages.....................................................................................................................26
MAN................................................................................................................................................26
MAN Advantages........................................................................................................................26
MAN Disadvantages....................................................................................................................26
WAN................................................................................................................................................27
WAN Advantages........................................................................................................................27
WAN disadvantages....................................................................................................................27
Wired Network...................................................................................................................................28
Ethernet Networks:..........................................................................................................................28
Wireless Network...............................................................................................................................28
Advantages:.....................................................................................................................................30
Disadvantages:.................................................................................................................................30
OSI Model...........................................................................................................................................30
Physical Layer.............................................................................................................................31
Application layer.........................................................................................................................32
Benefits of TCP/IP:..........................................................................................................................33
Drawback of TCP/IP:......................................................................................................................33
802.1X.................................................................................................................................................34
Network Topology.............................................................................................................................34
Bus Topology...................................................................................................................................35
Ring Topology.................................................................................................................................35
Star Topology..................................................................................................................................36
Mesh Topology................................................................................................................................36
Tree Topology.................................................................................................................................37
Hybrid Topology.............................................................................................................................37
Communication..................................................................................................................................37
Advantages:.....................................................................................................................................38
Disadvantages:.................................................................................................................................38
Bandwidth Requirements.................................................................................................................38
Network Protocol...............................................................................................................................40
Networking Devices...........................................................................................................................41
Network Server..................................................................................................................................43
1. Web server:........................................................................................................................43
2. File server:.........................................................................................................................43
3. Database server:................................................................................................................43
4. Mail server:........................................................................................................................43
5. Application server:............................................................................................................43
Access Permissions.............................................................................................................................43
Workstation hardware:.....................................................................................................................45
Range of Servers................................................................................................................................46
Conclusion..........................................................................................................................................50
Activity 2:...........................................................................................................................................50
Introduction........................................................................................................................................50
Network Design..................................................................................................................................51
System requirement.........................................................................................................................52
Feedback Form..................................................................................................................................66
User Feedback:................................................................................................................................66
Аnаlysis of user feedbаck to optimize designs аnd improve efficiency of connected solutions:.69
Testing:............................................................................................................................................80
Testing:............................................................................................................................................86
DHCP Installation.............................................................................................................................86
Use of Router......................................................................................................................................99
Use of Firewalls..................................................................................................................................99
Selection of Protocol........................................................................................................................100
Selection of Topology.......................................................................................................................100
Design implementаtion....................................................................................................................101
Conclusion........................................................................................................................................102
References:.......................................................................................................................................103
Acknowledgement
I am truly thankful, for our teacher, Ruman Thapa, who serves as our networking instructor. His
guidance and assistance throughout this project have been invaluable. His experience, energy and
dedication to teaching have not motivated us. Also provided us with significant support.
Thanks to him we have acquired the knowledge and skills to successfully accomplish this
networking project. His willingness to share his expertise and patiently address our queries has
greatly deepened our grasp of networking principles.
This has enabled us to tackle obstacles and strive for excellence in our work. Your mentorship plays
a role in shaping our development and nurturing a profound understanding of the intricacies of
networking. Your mentorship is an aspect of our journey and we are genuinely grateful, for the
opportunity to benefit from your teachings.
Sincerely,
Prashna Acharya
Introduction
As an IT professional leading the way for DinaTech Solutions branch in Pokhara I am
thrilled to share a plan that reflects our dedication to providing advanced technological solutions and
maintaining strong network infrastructure. Known for our excellent and innovative approach
DinaTech Solution is looking to expand its services to the public in Pokhara by offering a range of
tech devices and applications.
Aligned with our company goals the proposed network setup for the Pokhara branch involves
four departments, each, with roles and infrastructure needs. Through planning and implementation of
an efficient and interconnected network structure our aim is to empower each department to function
efficiently while ensuring the protection of sensitive data and resources. The report will detail the
strategies and actions to be taken to meet the network requirements of DinaTech Solutions, including
establishing both wired and wireless connectivity, implementing robust security measures, and
optimizing data traffic flow. The approach will be based on industry best practices and customized to
Activity 1
This course will cover networking devices, protocols, and strategies. Topics covered include the
benefits and drawbacks of networking solutions, the influence of network architecture, bandwidth
needs, communication, and how protocols may improve network systems. The gadget functions,
with network security and various servers. In order to guarantee that the network systems may be
utilized within the company, I will also select an architecture.
The primary ideas, topologies, and functional features of various network devices will all be covered
in this section of the formal presentation. At Dinatech Solutions, I serve as both the CEO and Senior
Director of Networks. A topology suited for the current situation is also provided. The presentation
includes supplementary information.
Presentation:
Supporting Notes
Computer Network
A computer network is like a big group of computers that talk to each other and share things like
pictures and games. These devices can connect to the network either through physical cables or
wirelessly. Once connected, data is transferred between devices using various communication
protocols like TCP/IP, SMTP, and FTP.
LAN
A local area network (LAN) is like a group of buildings in a neighborhood or office that are
connected together. It is small and usually has around 10 to 100 people using it. Many people can
share and use the network at the same time. In order to share shared resources like printers, hard
discs, and modems, two or more computers may now work together thanks to LANs.
LAN Advantages
1. It offers fast data transfer speeds.
2. Low latency to cut down on device-to-device communication delays.
3. It's simple to organise and run.
4. Both LANs and their components are inexpensive.
5. Since its limited to one place, it's likely more secure.
LAN Disadvantages
1. LANs are not ideal for linking geographically separated places due to their restricted reach.
2. LAN growth is challenging and necessitates network modification, particularly in big enterprises.
3. A local area network (LAN) restricts connections to devices located on the same network.
4. Maintaining and controlling your LAN infrastructure gets more difficult as your network expands.
MAN
The distance between a LAN and a WAN is covered by a MAN. Compared to the LAN, the MAN
offers a higher data rate and range, but not as much as the WAN. The primary distinction between
LAN and MAN is this. WAN and MAN have similar geographic requirements.
MAN Advantages
1. MAN joins many LANs to form a bigger domain.
2. The WAN allows for speedier data transfer.
3. MAN distributes resources, such as servers and data centres, among several sites.
4. Using MAN's extra features might enhance damage recovery performance.
5. Limited LAN coverage and costly WAN infrastructure are balanced by MAN.
MAN Disadvantages
1. MAN design and upkeep are more difficult than LAN design.
2. Installing a MAN may require a sizable infrastructure and leased line.
3. MAN latency is higher than LAN latency but lower than WAN latency.
WAN
WAN has coverage larger than LAN and mainly used for cellular applications supporting both voice
and data applications. Larger network covering entire country or state is referred as WANs. Most
WANs are telephone systems.
WAN Advantages
1. WANs provide global connectivity, allowing organizations to connect geographically distant
offices and users.
3. They enable centralized control of resources and data which enhances data management and
access control.
4. WANs support remote access for users and devices which facilitates remote work and mobile
connectivity.
WAN disadvantages
Wired Network
A computer network that is wired is one in which actual cables are used to link devices to one
another. Through the transmission of data signals between equipment like computers, servers,
printers, and routers, these connections provide communication and data transfer. In comparison to
wireless networks, wired networks include benefits including quicker speeds, more security, and
continuous and dependable data transfer. However, since they need physical infrastructure, they are
less flexible and more complicated than wireless networks.
Ethernet Networks:
This particular type of network is widely recognized as the most commonly used for constructing
Local Area Networks (LANs). To create connections between different hardware elements like
switches, routers, and PCs, it uses Ethernet connections, which are usually made of copper. Because
Ethernet networks are dependable and can provide acceptable data transfer speeds, they are ideal for
small to medium-sized enterprises as well as residential settings.
Wireless Network
A wireless network is a collection of computers connected without the need of wires. To
communicate between network components, they employ radio waves. This enables roaming within
network range of your device to establish a connection to the network. There are a multitude of
Hybrid Network
A hybrid network combines many network types, such as wired and wireless, to maximise efficiency
and flexibility by utilising the distinct advantages that each offers. Through the integration of several
network types, including wired and wireless, a hybrid network may maximise its efficiency and
flexibility by utilising the unique benefits of each network type.
Advantages:
1. Hybrid networks offer continual advantages and uninterrupted connection by mixing many
network technologies. Repetitive technologies are used to do this.
2. Organizations can choose to have hybrid networks, which allow them to design their networks
according to the requirements of their specific location or function.
3.They can be cost-effective because organizations can leverage existing infrastructure and adopt
newer technologies to meet changing needs.
Disadvantages:
1. Because of the combination of many network technologies, managing a hybrid network can be
challenging.
2. Because every network type may have unique vulnerabilities that must be handled and guarded,
hybrid networks may provide security problems.
3. To keep a hybrid network operating smoothly and ensuring interoperability amongst various
network components, continuous monitoring and administration are necessary.
4. The quality and design of each network type might affect a hybrid network's performance,
potentially resulting in inconsistent data transfer and user experience.
OSI Model
The Open Systems Interconnection Model, also known as the OSI model, is a theoretical framework
that outlines the operations and interactions within a network system. It provides a set of guidelines
Prashna Acharya (First Semester) 35 | P a g e
Networking
and requirements that enable various hardware and software components to work together
seamlessly. By categorizing communication between computing systems into seven distinct levels,
namely physical, data, network, transport, session, presentation, and application, the OSI model
ensures a systematic and efficient approach to network functionality.
Physical Layer
The physical layer is like the part of a computer system that carries messages from one place to
another. It uses things like cables, wires, switches, and routers to send digital and electrical
messages. It can send messages through different types of physical materials, like copper and fiber
optic cables or even through the air.
Application layer
This top layer is like the bridge between the internet and the people who use it. It helps us access
websites and use things like a web browser.
2. This model has layers. Changes made to one layer do not affect other layers unless there
are significant changes to the interface between layers.
1. Host-to-Network Layer: This is the lowest layer and deals with data transport physically. TCP/IP
is like a magic toolbox that can work with many different rules, but it doesn't have any rules of its
own.
2. Internet Layer: This is like a special set of rules that computers use to talk to each other on the
internet. The main rule is called the Internet Protocol, and it has some helpers called ICMP, IGMP,
RARP, and ARP.
3. Transport Layer: This layer helps make sure that data goes smoothly from one place to another.
It uses protocols called User Data Protocol (UDP) and Transmission Control Protocol (TCP) to do
this.
4. Application Layer: This top layer helps different programs talk to each other. It includes
important ways for programs to communicate, like sending emails, browsing the internet, and
connecting to other computers.
Benefits of TCP/IP:
• It functions without reliance on the operating system.
• It facilitates the establishment or configuration of connections between various PCs,
computer kinds, etc.
• It is capable of autonomous operation.
• The high cable client-server architecture of the TCP/IP paradigm allows for
interorganizational internetworking.
Drawback of TCP/IP:
• TCP/IP is a challenging paradigm to configure, administer, and regulate.
• It's hard to switch out a protocol in TCP/IP.
802.1X
802.1X is a port-based network access control protocol. The use of 802.1X-based user
authentication, which is widely used on networks with strict information security standards, is
referred to as "802.1X authentication".
Network Topology
Network topology is a way of referring to the design and positioning of behind-the-scenes
interconnections between systems, devices, and communication links that constitute a computer
network. It consists of both how data moves across these constituents physically and in terms of their
logical structure. The overall layout for data transfer between the computers depends on connections
among nodes and a meshwork for further operation.
Basically, network topology elucidates the arrangement of networking devices as well as their
interaction patterns with one another. This basic structure sets up the operating system controlling
Prashna Acharya (First Semester) 39 | P a g e
Networking
network protocols, communication standards and mechanisms of data transmission. Scalability, fault
tolerance, efficiency and security are some aspects determined by network topologies in the context
of network design and performance especially. Different kinds of network topologies exist.
Merits:
Demerits:
• Signal degradation and collisions happen especially as the network expands or grows larger
• This network type has limited troubleshooting capability due to its design
• It also limits cable length and number of devices.
Ring Topology
In a ring topology, all the connected nodes form a circle where data can only travel in one direction.
Each node is connected to two other nodes, creating a circular path for the data to follow until it
reaches its destination.
Merits
• There are no collisions in the data transmission process.
• It has a homogeneous, basic structure.
Demerits
• The network could come to an end if one node malfunctions.
• Unable to modify nodes without interfering affecting the network's functionality.
• There are limits to its scalability.
Star Topology
In a star architecture, each node is connected to a special device called a hub or switch. This central
device is required to be used for all data transfer between the nodes. Nodes are not directly
connected to one another.
Merits:
Demerits:
• The whole network can collapse if there is failure in the central device which itself generates
dependence on it.
• More cabling is required for this type of topology than in others.
• Limited separation between the nodes.
Mesh Topology
A many-to-many connection is formed when every device on the network is linked to every other
device using a mesh architecture. It connects directly to other things. There are several methods for
transferring data between computers. It lacks a switch, hub, or any other central computer that serves
as a hub for communication. One example of a mesh topology is the Internet.
Merits:
• High performance and error: If a link or node fails, an alternate path can be used.
• Scalability: Additional nodes can be installed easily without too much trouble.
Demerits:
Tree Topology
Devices are arranged hierarchically in a tree topology, with a central device—a router or switch, for
example—acting as the tree's root and additional devices branching out from it. A tree topology is
like a tree with branches. All the other parts are connected to the main part, which makes a
hierarchy. It needs to have at least three levels.
Merits:
• The network's dependence on root nodes means that when one fails, the entire system fails.\
• Difficult to establish and oversee.
• Constrained by a system of rank.
Hybrid Topology
Hybrid topology refers to the merging of multiple distinct network topologies. When two or more
different topologies are integrated, a hybrid topology is formed, whereas connecting similar
topologies does not produce a hybrid topology.
Merits:
Demerits:
Communication
The exchange of information, concepts, sentiments, and thoughts among people, groups, and
organizations is known as communication. It is a fundamental component of human connection and
Advantages:
Using a common way to talk to each other on the internet, like TCP/IP, can help make
networks work better together.
Each type of job on the internet, like sending emails or browsing websites, uses its own
special way to communicate.
Sometimes, making sure phone calls or video chats go first can make the internet faster for
everyone.
Disadvantages:
Using different ways to talk to each other can make things more complicated and harder to
take care of on the internet.
Sometimes, talking with our voices or through videos can be made faster by making it more
important than other things.
Bandwidth Requirements
Networking Principles
Performance: In order to satisfy user and application demands, the network must monitor length,
speed, and availability. Droduction-related efficiency. This requires the best network design,
bandwidth allocation, and resource utilisation to prevent bottlenecks and delays.
Security: In a network, security is really important to make sure that only the right people can
access it and to keep it safe from bad guys. There are different things we do to make this happen,
like using special walls called firewalls, having rules about who can get in, locking information with
secret codes, checking if someone is who they say they are, and always checking to make sure
everything is still safe.
Prashna Acharya (First Semester) 44 | P a g e
Networking
Modularity: The way the network is set up works well together and everything fits together nicely.
Assign and complete assignments and tasks into distinct levels or portions. This adaptable design
enables modifications to individual components without impacting the network as a whole, hence
promoting flexibility, scalability, and sustainability.
Layered Architecture: The TCP/IP and OSI systems both organize the different jobs that a network
needs to do into different categories. To encourage interoperability and abstraction, each layer
carries out certain functions and communicates with other levels via defined protocols and
interfaces.
Fault Tolerance: Networks have to be built to withstand errors and bounce back quickly. Among
the fault tolerance strategies that provide uninterrupted operation while lessening the impact of
hardware or software failures are redundancy, load balancing, and failover.
Network Protocol
Networking Devices
Network equipment is equipment that manages communication and data transfer on a computer
network. These gadgets are crucial for ensuring network security, arranging data transit, controlling
traffic, and connecting devices. Various network devices perform different tasks within the network
infrastructure to promote reliable and effective operation of the network. Typical network equipment
includes:
4. Modem:
Modems help computers talk to each other by changing their messages into a form that can travel
through phone lines or cables. They convert the analogue signals back into digital data at the other
end by demodulating them.
5. Firewall:
One kind of tool for network security is a firewall. In accordance with predefined security
requirements, keep an eye on and manage all network traffic, both entering and leaving the system.
They serve as barriers that keep malware, illegal access, and other online hazards out of trustworthy
internal networks and untrusted external networks like the Internet.
6. Hubs
Network devices are connected to each other using hubs, which help send information in different
ways. Digital information is sent in small packets, while analogue information is sent as a signal.
Hubs can also help make the signal stronger if it gets weaker over long distances. Hubs work at the
bottom level of a system called OSI.
Network Server
A network server is like a really powerful computer that helps other computers in a group share and
use things together. It's kind of like a leader that helps them all work together. A network server, as
opposed to a standard workstation, is devoted to managing network functions including email
processing, data storage, and application hosting. The following are some typical kinds of network
servers:
1. Web server: Stores and provides clients with access to web pages over the Internet or
intranet, as well as provides web pages that users request when they visit the website.
2. File server: Specifically designed for file management and storage, this network-based
tool allows users to save, retrieve, and exchange files—a necessary feature for collaboration
and data access.
3. Database server: Manages client requests and serves as the database's host. For the safe
and effective administration of massive volumes of data utilized in business contexts, this is
crucial.
4. Mail server: Oversees and enables email correspondence, maintains email records,
handles both inbound and outbound messages, and guarantees the safe and effective
transmission of emails.
5. Application server: It host and manage certain programs and make them accessible to
network users, offer a framework for administering software, services, or applications.
6. Domain name system (DNS) server: This technology helps people visit websites by
typing in easy names instead of long numbers. It changes the website names into numbers.
Access Permissions
Access permissions are like rules that decide what a person or a group of people can do on a
computer or network. These rules determine how much control or access they have over things like
files, folders, or programs. The activities that users are permitted or prohibited to take on particular
Read: Permits users to access a file or directory's contents, but not edit or remove it. Files may be
opened, their contents seen, and copies made to other places by users with read access.
Write: Permits users to alter or edit a file's, directory's, or resource's contents. Write-permission
holders are able to add, modify, and remove any files, folders, or data that they contain.
Execute: Allows users to use and run programs, scripts, or files that make things happen on a
computer. You need permission to do this on most computers so that you can use and run different
things.
This software is like the special instructions or rules that your toys need to follow when they play
together. For everything to work properly, the operating system needs to have all the right tools and
instructions. These tools are like the services and protocols that the operating system provides. They
help your toys communicate and do their jobs in the network. Lastly, because the device is
connected to the network correctly, network software enables workstations to function effectively
and safely while conforming to network standards and services. In order for the network to work
correctly, the device and the computer need to work together.
Workstation hardware:
Range of Servers
There are many servers in the market. They all have unique qualities and operate in distinct
ways. A list of several of them is provided below, along with a comparison table showing their
qualities.
Lenovo Company manufactures a tower server called the Think System ST650 Tower Server It uses
two Intel Xeon Scalable processors from the third generation, each of which has the capacity to
support up to 36 cores and 250W of power. It can accommodate 32 GB of RAM. With its eight
DIMM channels, DDR4 at 3200 MHz is supported. This is a special computer that can hold a lot of
information, like games, pictures, and videos. It likes to use certain types of software to work, and it
lists for about $3200.
Lenovo Company manufactures a tower server called the Think System ST550 Tower Server. Two
Intel Xeon Platinum 2nd generation processors, each capable of supporting up to 22 cores, 3.8 GHz
core speeds, and 125W of power, are used in it. It has 32 GB of RAM capacity. Its twelve DIMM
channels support DDR4 at 2666 and 2933 MHz. It has a storage capacity of up to 768GB. It lists for
about $2000.
In our network system, we employ a tree topology. This topology's primary feature is that the
total number of nodes that comprise the network is infinite. A high number of nodes is needed since
we are building a network for a computer service system, which is often a huge network. But this is
not an issue because of the topology's nature. The most crucial components of any organisation,
particularly in the financial industry, are data, records, and information. As a result, enterprises place
a high premium on data security.
The network's data loss can be minimised using this topology. The main advantage of this
topology is the amount of network that financial network systems can use. You don't need additional
network equipment to expand your network. Also, since the company has four offices, a tree
topology helps create a smaller monitoring network for each office. Also, even if there are problems
in the network, it is easier to find components in one topology than in other topologies. Another
important feature of this topology is that there are few constraints. Topology maintenance is
difficult, but it is not a big problem because we hire experts. As a large network and IT services
organization, network installation and maintenance costs are not an issue for this organization.
Therefore, we conclude that tree topology has many advantages and features that match or meet the
system requirements of network systems. Also, there are fewer restrictions and the current
These four protocols were selected and implemented in the IT Service system for the reasons listed
above, along with their respective functions. Despite having distinct responsibilities and functions of
their own, they cooperate to improve network connectivity and the overall effectiveness of the bank
network system.
Conclusion
We learned about various online tools and tools. Computers and protocols and their role in networks.
Therefore, we changed the important parts of this report and decided to choose one of the best IT
service providers. After detailed research and interviews with bank senior management, we decided
to choose the ST650 V2 system concept as the best server for the financial system. After that, we
selected 4 methods and a good topology that may be needed in the Internet (i.e. tree topology) to
make network communication more efficient. Finally, after combining all these elements in the
report, we are ready to move on to our next statement, which includes all the knowledge and related
documents of this concept (building a financial system).
Activity 2:
Introduction
DinaTech Solution is a Bhaktapur-based IT service company. It has long since been offering its
services to the people of Nepal. The business has made the decision to build a new branch with state-
of-the-art machinery and software in Pokhara. There are four main divisions within the sector, each
with its own set of duties and infrastructure. The personnel in each department and their tasks have
already been determined by the central office. After the new branch started, the organization started
helping people in Pokhara.
In Activity 2, I want to use the best design tools to make a network that works well for DinaTech
Solution. I will also plan how to take care of the network, set up devices, make sure it's secure, and
follows the rules. I will make a plan to test the network and make sure it works the way it should. I
will listen to what users want too.
Network Design
System requirement
The following set of criteria was defined based on the scenario that was applied.
IT Department: 6 PC
Finance Department: 5 PC
HR Department: 4 PC
Step 5: Link the PCs and servers with router through switch.
Step 6: Test the configuration using ping on each PCs command prompt.
Step 9: Access any networked computer, click on the desktop, and choose the IP configuration
option to test the DHCP server. After selecting the DHCP option, a new IP address will be assigned
by the system automatically.
Choose the server location first, then go to the desktop part and choose the Firebase option to start
configuring Firebase. After that, follow the guidelines to put the necessary security measures into
place.
Testing:
Routers play a crucial role in the seamless transmission of data packets across numerous
interconnected networks within a larger network. Additionally, routers facilitate the sharing of a
single public IP address among multiple devices, offering the advantage of selecting a server that
offers optimal cost-effectiveness and performance.
4.
Subnetting
To make it easier to take care of a big network, we can split it into smaller parts using a method
called subnetting.
5. Access Point
n access point is like a special tool that helps you connect to the internet or other devices in a
network. It can be a small thing you hold or even something that exists inside a computer.
6. IP Addressing
An IP address is like a special number that devices use to talk to each other on the internet, just like
people use phone numbers to talk to each other on phones. This table shows the different parts of our
department's internet connection, like addresses and settings.
IP Configuration
You can use a tool called ipconfig on a Windows computer to see information about how it's
connected to the internet. When you run ipconfig, it shows you details like your IP address and how
your computer is connected to the internet.
Feedback Form
DinaTech Solution's new branch in Pokhara needs feedback to help them build their network system
well. By actively collecting user input, IT personnel may identify unexpected issues or challenges
that user may have while utilizing the technology for the first time, allowing for speedy adjustments
and preventing any disruptions.
User Feedback:
Concerns are ranked according to severity and frequency once the inputs have been classified, with a
focus on issues that are reported often and have a major effect on the user experience. After
identifying the most critical problems, workable fixes for each problem must be identified. Among
the things that need to be addressed are the speed, security, usability, and clarity of the internet. We
select the concepts that have the most potential to improve people's lives, and we do thorough testing
to ensure their viability. This might entail evaluating them online and seeing how well they function
with actual users.
In order to ensure that solutions work effectively and do not cause any issues, it is important to
thoroughly test them. The combined solution is modified based on feedback and checked for any
Maintenance of Day 1
Maintenance of Day 2
Maintenance of Day 3
Our networked system will continue to function as intended and won't experience any unplanned
outages if we follow the maintenance schedule.
1. Install VMware, then add Windows Sever 2012 in it and open it.
2. From the network properties, choose Ethernet0, disable IPV6, and then assign IPV4.
6. Following installation, choose "Promote this server to domain controller" by clicking the flag
symbol (as shown in the figure):
11. Next, open server manager and choose the Tools menu's Active Directory Users and Computers
option.
15. By clicking on the group to which we wish to add a new member, we can now add the new user.
Next, choose the member area and press the "Add" button, as seen in the picture.
Testing:
After the setup is finished, we must evaluate its success. We might use ping or examine the server
management data to be sure. Press Enter after typing "ping "domain name" into the command
prompt. The procedure is finished if this produces a result.
Step 3: Click the Tools menu and choose DNS once the installation is complete.
Step 5: Next, choose Next, provide the scope's name, and supply the beginning and terminating IP
addresses in the ensuing wizard.
Step 7: To continue, repeat the previous method's steps: right-click on the Reverse Lookup Zone,
select New Zone, and then click Next.
Step 10: Next, right-click in DNS Manager on the website inside the forward lookup zone, and
select New Host (Α or AAАА) from the menu.
Step 11: After entering the IP address and selecting www as the name, click Add Host.
Step 12: Interface will show like this after completing the method.
Testing:
By utilising Command Prompt and pinging the server using its name or IP address, we can verify the
DNS server.
DHCP Installation
Step 1: In the Server Manager window, select Manage, then Add Roles and Features.
Step 7: Select IPv4 from the right-click menu, then select New Scope and Next.
The server and the client are on the same local area network.
Proceed to the Network and Sharing Centre, choose Local Area Connection, and then select
Properties. then select "Get IP address automatically." By doing this, you can make sure the DHCP
server is running correctly. The IP address is assigned inside the range mentioned above, as seen in
the picture.
The testing between the computers in the finance and IT departments goes quite well, with no errors
or improper settings.
Prashna Acharya (First Semester) 100 | P a g e
Networking
Testing: DNS
Test Expected Result Real Result Remark
s
Testing: DHCP
Test Expected Result Real Result Remark
s
When new Success
users join the
same
network, IP
addresses
should be
assigned by
the DHCP
server
automatically
.
Use of Router
It has several advantages, including enhanced performance, security, scalability, and dependability.
DinaTech Information Technology Solutions. The network architecture for the Pokhara Branch has
been implemented, and a careful analysis of it might yield important insights for enhancing the
system further. The effective installation of networking infrastructure emphasizes the significance of
both protocol selection and network layout.
Use of Firewalls
A firewall is a crucial security mechanism that improves computer networks by examining data
packets in order to stop malicious software and stop illegal access. Among its advantages are
Selection of Protocol
Network protocol is a collection of rules that controls how data is transmitted and communicated
inside a network. Without network protocols, a network would not be able to function. There are
many protocols used in networks, chosen based on the network's objectives and requirements.
HTTPS protocol is used in the bank network system to enhance security through encryption with
TLS. These protocols were chosen for their unique roles and functionalities, working together to
facilitate effective communication and improve the efficiency of the bank network system. DNS
protocol translates user-entered URLs into IP addresses to enable access to desired webpages. The
DHCP mechanism saves time by automatically assigning IP addresses to network components. TCP
and IP protocols work together to establish connections and ensure data packets are correctly routed
to their destinations, serving as the foundation for internet connections.
Selection of Topology
Design implementаtion
We accomplished the plan by utilizing a standard topology for communication and centralizing the
network with the aid of domain controllers. In order to safeguard the network from potential dangers
and prevent unauthorized entry, a firewall was installed. Alongside this, a router was incorporated to
establish connectivity between two distinct networks. Furthermore, the switch was employed to
connect the router with numerous servers and client PCs. The DHCP server played a crucial role in
assigning dynamic IP addresses to the client PCs. To efficiently handle printing tasks from the client
PCs, a few printers were designated as print servers. Moreover, a VPN server was employed to
ensure secure data transmission and protect against data theft. Additionally, WDS servers were
configured to streamline the process of updating operating systems for staff members, eliminating
the need to access computer files.
Conclusion
During this particular task, I discussed my process for selecting the most suitable design for my
project. I elaborated on the program that I utilize for this purpose. I used to construct the system and
the system I designed. I described the testing, setup, and a comparison of the predicted and actual
outcomes. Finally, using the data I had acquired, I suggested a few modifications that might be done
to enhance the design. Rephrase it in a clear and original manner.
The system has undergone extensive testing and analysis. Furthermore, we established a
detailed maintenance plan to assist in the management of the network in the future. The feedback
provided by network users was highly praised and taken into consideration. The network design
effectively meets the needs of the organization. Users find the system to be user-friendly, easily
manageable, and simple to maintain. By implementing a virtual private network server, secure data
can be transmitted between the main office and satellite locations. In my role as the network
administrator at Landmark IT, I successfully and effectively established the essential servers
required for safeguarding data, seamlessly allocating IP addresses, and facilitating numerous other
functionalities.
References:
Yasar, K. and Gillis, A.S. (2023) computer
network. https://www.techtarget.com/searchnetworking/definition/network.
Keary, T. and Keary, T. (2024) Network Topology: 6 Network Topologies Explained & Compared.
https://www.comparitech.com/net-admin/network-topologies-advantages-disadvantages/.
Keary, T. (2023) '9 Types of network protocols & When to use them,' Forbes Advisor, 10 August.
https://www.forbes.com/advisor/business/types-network-protocols/.
Perlmutter, W. (2024) Best 13 Feedback Form Examples and Templates [2024 update].
https://usersnap.com/blog/feedback-form/.