Pass Assignment 1
Pass Assignment 1
Task 1/ P1
Discuss the benefits and constraints of different network types and standards.
Introduction
In this task I am going to discuss the advantages and disadvantages of different network types and
standards. Like Peer based, Client-server, cloud, cluster, centralized and virtualized network.
Client-Server network:
A computer network in which one centralized server is a hub to which many client computers are
connected.
Centralized Network:
It is a type of network in which all computers are connected with main server which is
responsible for all communication within a network.
Subash Poudel (HND / first Semester)
1
Professional Practices 2018
Virtualizes Network:
The process of splitting the physical network entities routers, switch, firewall, etc. into multiple
logical network entities separating the users traffic from different instances.
Cloud Network:
It is a cloud based networking which uses resources from centralized third party provider using Wide
Area Networking.
Cluster Network:
It is a group of servers and the resources that act like a single system which enable the high
availability. It is also used to control each node’s status and communicate with each other.
TCP/IP Model:
It is a combination of two separate protocols transmission control protocol and internet protocol.
TCP/IP is a set of protocols governing communication among all computers on the internet. This
model divides networking functions into various layers. The layers are :
1. Application Layer
2. Transport Layer
3. Internet Layer
4. Network Access Layer
Disadvantage of TCP/IP:
It is difficult to establish and manage. It cannot be used in any other application. It is hard to replace
protocols.
OSI Model:
The Open System Interconnection (OSI) model is a reference tool for understanding data
communications between any two networked systems. There are 7 layers they are :
1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
IEE 802.X:
There are fundamentally six sorts of network standards created IEEE i.e. 802.1, 802.2 etc. IEEE
802.1 is for most part related to arrange administration and IEEE 802.2 is identified with OSI Model.
Usually IEEE 802 shows the services, features and protocols for network.
Conclusion:
Different kinds of network and other network standards have their own significance and activity in
their particular fields. The TCP/IP model and OSI model is the portion of the reference or examined
as abstract model for the network standards. As network architecture reflects network system design,
TCP/IP and OSI model represent the responsibility between network devices for communication in
the architecture.
Task 2 [P2]
Introduction
A network topology is the arrangement of a network, including its nodes and connecting lines. It is
the topological structure of a network. Network topology is the schematic description of a network
arrangement, connecting various nodes (sender and receiver) through lines of connection. Network
topology explain how the different nodes are kept and interrelated with each other. Consecutively,
network topology defines how the data is moved between these knots. Topology is a way in which
the network of computers is attached. Each topology is suited to exact tasks and has its own
advantages and disadvantages. Selection of topology is required according to the need, rate of data
transfer required, response time and cost. There are two ways of describing network geometry: the
physical topology and the logical (signal) topology.
There are different types of network topology. They are as listed below.
1. Bus Topology
2. Star Topology
3. Ring Topology
4. Mesh Topology
5. Tree Topology
6. Hybrid Topology
1. Bus Topology:
Bus topology is a network kind in which every computer and network device is linked to
single cable. When it has exactly two endpoints then it is called a linear bus topology. Many
of the networking values that we’re going to work with will use the bus topology whether
physically or logically. On a bus topology all data runs on a central wire. Each and every host
connected to that wire can communicate straight with any other host connected to the wire.
Now days we don’t see a lot of networks that are currently using physical bus topology.
Somehow, we will find many networks that still operate logically as a bus. Fig 1 shows about
bus topology.
2. Star Topology:
In this kind of topology, all the devices and hosts are connected with single host with cable .
This hub is the central device and all others device are connected to the central device. All
clients on the network are connect to the hub with a network cable and. If one device needs to
send data to some other devices connected to a network, it will send the data to the central
connecting device. The central connecting device then replicates the information and forwards
it on to the appropriate host. Fig 2 shows about star topology.
Impacts of Star Topology
Every node has its own dedicated connection to the hub. Hub acts as a
repeater for data flow. It can be used with twisted pair, optical fiber or
coaxial cable. It has fast performance with few nodes and low network
traffic. Hub can be upgraded easily. It can be easily modified, setup, and
troubleshoot. Installation cost is high. If hub fails then all network is
stopped because all the nodes depend on the hub. The performance is
based on the hub that is it depends on its capacity.
3. Ring Topology
There is no any central connecting medium in ring topology. It is called ring topology because
it forms a ring as each computer is connected to another computer, with the last one connected
to the first. Exactly two neighbors’ for each drive. Fig 3 shows about the ring topology.
nodes having tokens can transmit data. The whole network gets disturbed when there’s failure
of computer.
4. Mesh Topology
Mesh topology is a point-to-point connection to other nodes or devices. All the network nodes
are connected to each other. Let’s take a look at example with five hosts. This is also known
as a full mesh topology. And if we imagine that we have 10 hosts. Things would get
complicated really fast. Because of that, this topology is more theoretical, but can be
implemented more easily in wireless networking. Fig 4 shows about Mesh Topology.
5. Tree Topology
Tree topology has a root node and all other nodes are connected to it forming a hierarchy. It is
also called hierarchy topology. It should at least have three levels to the hierarchy.
easily done in this topology. Tree topology is heavily cabled and it is costly. If central hub fails, then
network fails. Also, If more nodes are added in this topology, maintenance is difficult.
6. Hybrid Topology
Hybrid Topology is the combination of different topologies. It is two different types of
topologies which is a mixture of two or more than two topologies. For example If in an office
in one department ring topology is used and in another star topology is used, connecting these
topologies will result in Hybrid Topology (ring topology and star topology). Fig 6 is the
example of hybrid topology.
Impacts of Hybrid Topology
Fig: 4
Conclusion:
Network topology is the arrangement and layout of network that determines how the network’s
devices are connected. So, without the proper knowledge of various topologies the effective network
can never be build. As all the topologies have their respective positive and negative impact so the
user has to choose carefully the effective one that meets the requirement efficiently. Without the
appropriate topology, the network may not meet the requirements of the organization.
Task 4 / P3
Discuss the operating principles of networking devices and server types.
Introduction
In this task I have described various network devices and server types that are very essential for
using internet. Network devices are used to share or exchange information in a high speed between
the computer networks. There are many devices in network to connect with internet which helps in
flow of data and files in a high speed and people use different devices for connecting to internet.
Now days, using internet is very important so, using networking devices are very common to use
network internet. There are various different servers which are used in using internet in our daily life.
Server
A server is computer that provide data to the another computers[ CITATION htt184 \l 1033 ]. Server
is a sample of computer program that accept and response to all massages by another program. In
network connection server process requested data and delivers it. It is responded via desktop to the
database that has characteristic of server. All business connects all of their desktop computers to the
server.
Hub
Hub is the most basic networking device that connects multiple computers or other network devices
together [ CITATION htt185 \l 1033 ]. In my view it is the network device which helps to multiple
computer are connected together. It is also known as network hub where hubs are devices commonly
use to connect segments of a LAN. Hub takes the data that comes into the ports and sends out all the
other ports in the hub.
Router:
A router is WAN device (Wide area network) and it connects two or more networks. Router connects
two or more that two networks so, it is called Inter-Networking device. It works on bases of OSI
model network layer and it is called layer third device. In router every port has its own broadcast
domain. Router uses IP address and transfer data in the form of packets. Router is comparatively
slow than that of switch.
Switch
Switch is the piece of hardware on network that allows communication between the devices within
that network[ CITATION htt187 \l 1033 ]. It is a computer networking device that connects devices
together on the computer using the packets switch. It has another word which is switching hub. It
connects various network devices together. In comparison, Switches are not as good as a router in
limiting broadcast. Also, switches are very expensive and it is difficult to find the network problems
through a switch.
Multi-layer switch:
“A multilayer switch is a network device that has the ability to operate at higher layers of the OSI
reference model, unlike the Data Link Layer (DLL) traditionally used by switches. A multilayer
switch can perform the functions of a switch as well as that of a router at incredibly fast speeds. A
switch traditionally inspects frames, while a multilayer switch inspects deeper into the protocol
description unit (at packet or even at segment level).” [ CITATION Tec3 \l 1033 ]. The design of the
multilayer switch is better than the router. With multiple layers we can easily get the functionality of
routing and switching linked and high output for access in a single box. Moreover, it also runs the
function of router and the switch.
Firewall
Firewall is the network security system that monitors control incoming and outgoing network traffic
and the devices. It is software or hardware maintained the security of a network. It obstructs
unofficial internet users from accessing private networks connected to the internet. It protects us
from different unwanted resources which are harmful for us.
HIDS
“[ CITATION Tec4 \l 1033 ]A host-based intrusion detection system (HIDS) is a system that
monitors a computer system on which it is installed to detect an intrusion and/or misuse, and
responds by logging the activity and notifying the designated authority”. If network based ISD
sensors fail to detect then host base system can detect attacks. This system uses system logs
containing event that have actually occurred means they can find out whether an attack or not.
HIDS hard to manage, as information must be configured and it manage for all hosts. It can be
disabling by certain denial-of-service attacks.
Repeater:
A repeater is an electronic device which obtains signal and retransfer it at a higher level power than
previous. It is used for originating or replicating a signal. It also regenerate analog or digital signal
warped by transmission loss and works at first layer of OSI model. Repeaters can be classified in
analog and digital repeaters. Analog repeaters only amplify the signal and digital repeaters can
reconstruct a signal to near its original quality.
Bridges
Bridge is a type of computer network device that provides interconnection which other bridge
network that use the same protocol[ CITATION htt188 \l 1033 ]. In my view, it is a device used to
connect a multiple communication networks or network segments. It is also known as Layer 2
switches. Extensions diminish the measure of activity on a LAN by partitioning it into two
fragments. Extensions review approaching activity and choose whether to forward or dispose of it.
“An access point is a device that creates a wireless local area network, or WLAN, usually in an
office or large building. An access point connects to a wired router, switch, or hub via an Ethernet
cable, and projects a Wi-Fi signal to a designed area” [ CITATION LIN \l 1033 ]. In general access
point is a device such as a wireless router that permit wireless devices to connect to the network.
Wireless devices
Wireless devices host and control the wireless connection for laptop, tablets and other smart phones.
They are made using access points. It uses wireless data connection between networks and to enlarge
the range of router. Wireless devices escalate the flexibility and holds for most business.
Content filter
Content filtering works by if the strings of characters match and after the strings is equivalent, the
content is not allowed through. Content filters are generally part of Internet firewalls. In such a usage
content filtering is performing a security purpose, however content filtering is also used in
implementing company policies related to information system usage. It helps in decreasing the
amount of hacker, virus and other possible attracts by the content-filtering system. Contents filter is
very beneficial because it helps to reduce the ability and help to cut down on phone cells. It
maintains high level networks protection.
Load balancer
Load balancer is the device that acts as a reverse proxy and distributes network or application traffic
across a number of servers[ CITATION htt189 \l 1033 ]. It automatically distributes traffic across
many target with the help of network load balancer using complex routing protocols and also it is the
practice of allocating a workload across multiple computers. It helps in the business and also
increases the external traffic. We can add or delete sample as per our need without causing any
separation in incoming traffic.
Modem
Modem is a device or program that authorized a computer to transmit data over, like telephone or
cable lines. Modem can be defined as a hardware device that connects a computer and router in a
broadband network. It is useful in connecting LAN with the internet and has high speed that depends
on the cost. It also converts antonyms signals to digital signals and vice-versa. It can easily be
repaired. It acts just an interface between LAN and internet.
Packet Shaper
“Traffic Shaping, also known as “packet shaping,” is the practice of regulating network data transfer
to assure a certain level of performance, quality of services or return on investment”[ CITATION
Mar4 \l 1033 ]. “The practice involves delaying the flow of packets that have been designated as less
important or less desired than those of prioritized traffic streams” [ CITATION Mar2 \l 1033 ].
VPN Concentrator
A VPN concentrator is a type of networking device which provides or supply safe and secure
creation of VPN connections and delivery of messages between VPN nodes. It is specifically built
for creating and managing VPN communication infrastructures. It can establish and configure
tunnels and authenticate users. It also can assigns IP addresses to users. At last, it also encrypt and
decrypt data and ensure end-to-end delivery of data.
Types of Server
Web Server
File Server
File Server is a server that helps in managing and sharing of files in computer as per the requirement
of clients. For transferring large files there should be high speed internet so that file can be shared in
evaluated time. Especially, Clients should proceed the data in their given time so file server helps to
transfer it as per their asked time.
Database server
Database is a place where data are stored in a manageable way which can be changed as per the user
command. For login into any server or application the database of the user is collected in such a way
that their information is kept whenever it is needed. By creating database, the users can login in into
their require server if there data is matched with data which is stored in that database. So, the data
management is done by the database server.
Virtualization
In virtualization one signal operating system can run different multiple operating system. one
computer can host different many other computers. Nowadays virtualization is used all over the
world. Every IT sector companies uses virtualization to do the different multiple works in a signal
computer.
Print Server
In this server all the printer is connected or linked to a single network. The main computer in this
server can access the printer from anywhere on that network. Print server is useful because printer
can be accessed by a computer and printing can be done easily without the help of other people. It
accepts client’s in order to print and after printing the requested data, clients can easily receive the
information about printing.
Conclusion
Eventually, all the networking devices and server type are very useful in networking. These
operating systems are useful in using internet all over the world. Every network devices are used to
connect or link with something that share files and data faster. For examples, hub, router, switch, etc.
are in networking devices and print server, file server are the server types.
Task5/P4
Roles of workstation:
Hardware is any physical devices whereas software is a collection of code which instruct hardware
about what task to be done. Hardware and software both are interdependent and each of them should
work together to produce an output. If there is no support of any hardware, then the software cannot
be used. The hardware cannot perform its task without proper instructions. To perform given a task
the relevant software package has to be loaded into the hardware. The different software package can
be loaded on a hardware to run different jobs. We can say the hardware and software are the heart
and soul of a digital computer. For example, the monitor which allow us to read the text is a
hardware and the operating system by which that page runs is software.
Task8/p5
Network is a group of computers or network devices for sharing the data that is stored in the
hardware and software. We can also use internet as example of network because it is used all over
the globe and connected millions of population. Here, We have to design a network diagram by using
Visio tool taking different servers like DC, DNS and Secondary DNS etc.
Printer Fax
dC Dhcp Rodc Wds
10.10.10.1 10.10.10.2 10.10.10.3 10.10.10.4
firewall router
switch
switch
router
DHCP:
DHCP is also called as Dynamic Host configuration protocol ,which provide the different
range of IP address. Such as router, which distribute the different range of IP Address.
RODC:
It is also known as read only domain controller it is the type of domain controller which has
permission to only read the data. It is used in different organizations which need only read partitions.
WDS:
“Windows deployment services is a server role that gives administrators the ability to deploy
windows operating system remotely and it can be used for network-based installation to set up new
computers so administrators do not have to directly install each operating system”[ CITATION Mar3
\l 1033 ].
DC:
“Domain is a server which includes the collection of users, groups, networks, and other network
devices or resources with common set of rules” [ CITATION Vin17 \l 1033 ]. Main function of DC
is to control all client computers and servers and manages the security.
DNS:
DNS is known for Domain Name System. It is a translation system that helps us to search the
internet using language which we are habitual. DNS sever translates the various IP address into the
user’s languages.
Child Domain is domain under the parent domain which is used in the branch offices in place of
Domain Controller. It also works as domain but the only difference is that, it works under Domain
controller.
Network Software is which is used to transfer data all around the network public networks. It allows
users to securely access the private network anywhere in the world.
Web Server:
Every time a client send command to a webserver it respond to server for starting the webpage that
client wants to start. It processes incoming network requests over the HTTP protocol.
Print Server:
A Print server is a server that can be accessed by any computer inside a network. It accepts the client
command to print and all the data is stored in print server while printing.
Network Devices:
Network devices are the components that are used to connect computers or any other electronic
devices together. Network devices I have used in above design air given below:
Cable:
“A cable is one or more collection of wire covered inside the plastic, that transmit the data as well as
power from one network device to another”[ CITATION Com17 \l 1033 ]. It helps to transfer data
and power from one device to another device.
Firewall:
“Firewall is a method planned to control the unauthorized access to or from the private network”
[CITATION Ind \l 1033 ]. It helps to stop the unauthorized internet users from entering the private
network which is connected to internet. Main cause of using firewall in network is to protect private
file which filter unknown errors.
Router:
The device which distributes IP address automatically and manually to the users is known as router.
It provides data packets within a network. It keeps the records of users IP which is distributed by it.
Gateway:
“A gateway is a network node that connects two networks using different protocols together while a
bridge is used to join two similar of networks, a gateway is used to joint two dissimilar
networks”[ CITATION Mar3 \l 1033 ].
Switch:
It is a networking device which connects the devices within a computer network. Switch has only
one broadcast domain. It uses MAC address and transfer data in the form of frame. It is faster then
hub.
Conclusion:
In this task I have shown the network design of the main office and branch office. I have described
the servers and devices I have used in my design. And I also have shown different IP address of the
servers that I have used in my network.
Task 9/P6
Test and evaluate the design to meet the requirements and analyze user feedback.
I have used different kind of devices and servers in my network. And here I will be Testing the
servers and evaluate and taken feedback from users to confirm that network system is usable or
unusable.
Testing table:
I have checked all the server that I have used in my network design and mentioned on the table with
what was the expected result and what was actual result with remarks. And it meets all the
requirements to be used in Nepal Bank Limited.
I have Shown the testing log of my network design and made a feedback form so that I can know If it
had meet all the needs of the clients/users So that I can evaluate the feedback and make change to the
network design according to the need of clients. The feedback formed is mentioned below:
Independent feedback
Project title: to implement the proposed design
Feedback given by: Signature:
Date: 2018/03/22
Project description: This project is about to implement the proposed design of the network. This
design consists of DHCP server, DC, WDS, Print server, web server. This system keeps data secure
and provides quality services to clients. It has high bandwidth and it can be scalable as client’s
requirements.
Important features of the Keep data secure in the system
project Have high data transfer rate
Create scope for DHCP
checklist Yes No Comment
Have find data and files required for design the
system?
Have system fulfill the demand of clients?
Have you get feedback about system?
Have front end and back end of the system has been
planned?
Does it secure data?
Is communication of data possible or not?
Feedback evaluation
Feedback evaluated by: Signature:
Date:2018/03/22
Evaluation of the system
I get the positive feedback from clients. Most of clients support my network design for the Nepal
Bank Limited.
Give comment if you need any changes:
Conclusion:
In this task I found that the design I have made for Nepal Bank Limited is useful to the clients. They
have a given a true feedback on my design.
Task13/p8
I have tested different servers and devices in my project. In this I will provide evidence that I have
successfully checked each and every servers and devices to meet requirements of my network
design.
Analysis:
It showed actual results and the results delivered expected output. Client has been able to get an
IP address. This shows DHCP configuration is successful in the system.
Analysis:
DC showed actual and positive results and the results delivered expected output. It has been changed
into domain base network.
Analysis:
Child domain controller shows expected output and positive result. Name of the CDC appeared by
joining with the name of Domain Controller. This shows CDC testing was successfully tested.
Analysis: windows deployment server shows positive results. This result delivered expected output.
Client computer was able to obtain desirable WDS which shows that WDS testing is successfully
testing.
Analysis: This testing shows positive result. Results delivered expected output. It shown name and
password of client with Domain Controller (DC). This shows that VPN testing has been successful.
Analysis: The deploy printer is ready status in client computer which shows positive result. This
shows the expected output and successfully tested.
Analysis: Secondary DNS testing showed positive result. Result delivered expected output.
Transferred data of primary zone appeared in secondary zone, which shows that DNS testing is
successful.
Conclusion:
In this way, I have taken screenshots of final result on each and every testing. Moreover, I have kept
all the screenshots of testing in above tables.