Networking Assignment
Networking Assignment
STUDENT DETAILS
UNIT DETAILS
Plagiarism
Plagiarism is a particular form of cheating. Plagiarism must be avoided at all costs and students
who break the rules, however innocently, may be penalized. It is your responsibility to ensure
that you understand correct referencing practices. As a university level student, you are expected
to use appropriate references throughout and keep carefully detailed notes of all your sources of
materials for material you have used in your work, including any material downloaded from the
Internet. Please consult the relevant unit lecturer or your course tutor if you need any further
advice.
Student Declaration
I certify that the assignment submission is entirely my own work and I fully understand
the consequences of plagiarism. I understand that making a false declaration is a form of
malpractice.
This project is very advantage to me. It helps to increase my knowledge and teach me the concepts
of network principles, impacts of various network topology, operating principles of networking
devices and servers. Likewise, it also helps me to design and implement a network for a small
organization like the branch of a bank. Still, implementation would not have been possible if I did
not have a support of many individual. Therefore, I would like to extend my sincere gratitude to
all of them.
First of all I am very thankful to my college ISMT for providing me this wonderful project
work. I am very thankful to my networking teacher Krishna Parajuli for his able guidance and
support in completing my project.
Many people, especially my classmates who have made very valuable comment and
suggestion on this project which gave me an inspiration to improve my project work. I would like
to thank all the people for helping me directly and indirectly to complete this project.
Table of Contents
Part 1
Introduction…………………………………………………………………………….…….…... 1
Client/Server Network……………………………………………………………...……. 1
Peer-to-Peer Network……………………………………………………………………. 2
Cloud Computing………………………………………………………………………… 2
Cluster Computing………………………………………………………………………. 3
Centralized Computing…………………………………………………………………… 4
Network Standard…………………………………………………...…………………………… 5
OSI Model…………………………………………………...…………………………….….…. 5
1. Physical Layer……………………………………………………………………….….... 6
2. Data Link Layer………………………………………………….……………….……… 6
3. Network Layer……………………………………………………………………………. 6
4. Transport Layer…………………………………………………………………………… 6
5. Session Layer……………………….……………………….…………………………… 6
6. Presentation Layer………………….…………………….……………………………… 6
7. Application Layer………………………….……………………………………………. 6
TCP/IP Model…………………………………………….……………………………………... 7
Topology…………………………………….………………………………….……………. 12
Types of Topology………………………………………………………………………. 12
Physical Topology………………………………………………………………………. 12
Logical Topology………………………………………………………….……………. 12
Bus Topology……………………………………………………………………………. 12
Ring Topology…………………………………………………………………………… 13
Star Topology……………………………………………………………………………. 14
Mesh Topology......……………………………………………………………….….…. 15
Tree Topology….………………………………………………………………………. 16
Hybrid Topology………………………………………………………………………. 17
Networking Devices……………….………………………………………………………… 18
Hubs……………………………………………………………………………………. 18
Switch …………………………………………………………………………………… 18
Repeater.………………………………………………………………………………… 19
Modem…………………………….……………………………………………………. 19
Router…………………………………………………………………….……………… 19
Gateway…………………………………………………….……………………………. 20
Firewall……………………………………………………...………….......……………. 20
VPN Concentrator…………………………………….…………………….……………. 21
Packet Shaper…………………………………………………………….……………… 21
Computer Server……………………………….……………………………………………… 22
Web Server……………………….………………………….………….………………. 22
Database Server…………….……………………………….…….…….…….…………. 22
File Server………………………………………………………….……….….….….…. 22
Application Server…………………………………………………………………....…. 23
Virtual Server……………………………………………………………………....……. 23
Terminal Server…….…………………………………………………………....………. 23
Email Server…………………………………………………………………...………… 23
Choice of Server…………….………………………………………….….….….……………… 26
Selection of Network Topology for the branch office of NIC Asia Bank…….………………… 27
Conclusion………………………………………………………….……….….….….….……… 28
Part 2
Network Requirements 31
Performance Requirements 31
Feedback Form 31
Lab Report 33
DNS Server 46
Print Server 85
Test and Evaluation of the network Design to meet the requirements 110
AD DS Testing 113
DNS Testing 114
DHCP Testing 115
IIS Testing 116
Print Server Testing 117
VPN Server Testing 118
Future improvements that may be required to ensure the effectiveness of the networked System 119
References 121
Networking | 2021
Introduction
A computer network is a group of two or more computers or devices that are connected with each other
in order to share resources, exchange files, or allow electronic communication. The computers use
common communication protocols over digital interconnections to communicate with each other. These
interconnections are made up of telecommunication network technologies, based on wired, optical, and
wireless radio frequency methods that may be arranged in a variety of network topologies. An example of
a computer network is the Internet that connects millions of computer and people around the globe.
Computer networks may be classified by many criteria, including the transmission medium used to carry
signals among the computer, bandwidth, and communication protocols to organize network traffic, the
network size, and the topology and network architecture.
❖ Client/Server Network
Client Server Network Architecture is an architecture of a computer network in which the server hosts,
delivers and manages most of the resources and services to be consumed by the client. This type of
architecture has one or more client computers connected to a central server over a network or internet or
internet connection. In this type of computer network the server acts as the producer and the client acts as
a consumer. The server houses and provides high-end, computing-intensive services to the clients on
demand. (technopedia.com, 2012)
A client/Server network contains the centralized system. Therefore, we can back up the data easily. It has
a dedicated server that improves the overall performance of the system and also increases the speed of the
sharing resources. Comparing a client/server network to peer-to-peer network, a client/server have better
security due to the administration of the shared resources from a single server.
Client/Server network is very expensive due to the need of a server as well as networking devices such as
hubs, switches and routers. The entire network will be affected if the server goes down. The cost of setup
and maintenance of client/server network is also high as it requires a dedicated network administrator to
manage all the resources and maintain functions efficiently.
❖ Peer-to-Peer Network
Peer-to-peer network architecture is a commonly used computer architecture in which every computer or
node has the same capabilities and responsibility of a network. It is decentralized system network where
there is no division or distraction of abilities among the computers in a network. Every section of a network
has the same responsibilities and can perform the same set of actions. It is modern day contemporary of
the classic client server network. (techopedia.com, 2011)
Peer-to-peer network has some advantages to use this type of network. It is simple and easy to setup and
maintain as each computer manages itself. As it does not contain any dedicated server and networking
devices the cost is low and affordable. Also, if one of the computers connected to the network stops
working, it doesn't affect the whole network and other computers will not stop working.
Having a lot of benefits, it also has some limitations compared to client/server network. There is no
centralized system in a peer-to-peer computer network that can cause data jams. The security and data
backups of a network have to be done to each and every individual computer. As the number of computers
increases on this type of network performance, security and access becomes a major headache.
❖ Cloud Computing
Cloud Computing is the utilization of different computer services and resources through the internet.
These resources include tools and applications like data storages, networking, databases servers and
software. Rather than keeping files on a hard drive or local storage device, cloud-based storage makes it
possible to save them to a remote server. As long as an electronic device has an access to the web, it has
access to the data and the software programs to run it. (investopedia.com, 2011)
Cloud computing is a very beneficial services for people and business for a number of reasons including
cost saving, increased productivity, speed, performance and security. It provides the ability to use software
from any device either via a native app or a browser. As a result, users can carry their files and settings
over to other devices in a completely seamless manner.
With all the benefits that come with cloud computing there are some risks. Security has always been a big
concern with cloud especially when it comes to sensitive medical records and financial information. Also
servers maintained by cloud computing companies may fall victims to natural disasters, internal bugs, and
power outages.
❖ Cluster Computing
Cluster computing is a form of computing in which branch of computers (often called nodes) are connected
through a LAN (Local Area Network) in order to work together for a common computing process. The
connected computer executive operations all together to create the idea of single system. A computer
cluster help to solve complex operations more efficiently with much faster processing speed, better data
integrity than a single computer. (ecomputernotes.com, 2018)
Among high availability options, clustering is very reliable and easy to configure. If a server in the cluster
needs any maintenance, we can stop it while handling the load over to other servers. It can also be easily
extended by adding the additional computer to the system. If any node fails to provide the services in a
computer cluster, another node within the cluster continue to provide uninterrupted services.
The cost of cluster is very high. Since the cluster needs good hardware and a design, it will be costly
comparing to a non-clustered server management design. Being not cost effective is a main disadvantage
of this particular design. Since clustering needs more servers and hardware to establish one, monitoring
and maintenance is hard. Thus, increase the infrastructure.
❖ Centralized Computing
Centralized computing is a very similar to a client/server architecture where one or more client computers
are directly connected to a central server or computer. Each client computer is a thin client with no or very
limited computing capacity. They generally have a visual display, basic input devices and a thin CPU with
networking capabilities. Client PCs are connected over the network to a central server that processes their
computations. The central server is deployed with the primary application, massive computing resources,
storage and other high-end computing-intensive features. (technopedia.com, 2013)
Some of the key benefits of centralized network are consistency, efficiency and affordability. One central
server control the whole network that reduces IT Management time and less admins are required. In
addition, all the data on the centralized network is required to go through one place, so it's very easy to
track and collect data across the network.
Centralized network does have some downsides. A single point of failure can create a risk factor for an
organization. If the center computer goes down, the individual client machines attached to it are unable to
process under user requests. Also, the only way to scale the network is to add more storage, I/O bandwidth,
or processing power to the server that is very less cost-effective solution.
2) Network Standards
Networking standards are the set of rules for data communications that are needed for interoperability of
networking technologies and processes. Standards help in creating and maintaining open markets and
allow different vendors to compete on the basis of the quality of their products while being compatible
with existing market products. It is important to follow Standards that are created by various Standard
Organization like IEEE, ANSI, ISO, etc. The primary reason for standards is to ensure that hardware and
software produced by different vendors can work together. Without networking standards, it would be
impossible to develop networks that can easily share information.
OSI Model
Introduction: The Open Source Interconnection (OSI) model describes seven layers that computer
system uses to communicate over a network. It was the first standard model for network communications,
adopted by all major computer and telecommunication companies in the early 1980s. OSI was first
introduced by representatives of the major computer and telecom companies, and was adopted by ISO
international standard in 194. Followings are the layers of OSI Model. (imperva.com,
1. Physical Layer: The physical layer is responsible for the physical cable or wireless connection
between network nodes. It defines the connector, the electrical cable or wireless technology
connecting the devices, and is responsible for transmission of the raw data, which is simply a series
of 0s and 1s, while taking care of bit rate control.
2. Data Link Layer: The data link layer establishes and terminates a connection between two
physically-connected nodes on a network. It breaks up packets into frames and sends them from
source to destination.
3. Network Layer: The network layer has two main functions. One is breaking up segments into
network packets, and reassembling the packets on the receiving end. The other is routing packets
by discovering the best path across a physical network. The network layer uses network addresses
(typically Internet Protocol addresses) to route packets to a destination node.
4. Transport Layer: The transport layer takes data transferred in the session layer and breaks it into
segments on the transmitting end. It is responsible for reassembling the segments on the receiving
end, turning it back into data that can be used by the session layer. The transport layer carries out
flow control, sending data at a rate that matches the connection speed of the receiving device and
control error.
5. Session Layer: The session layer creates communication channels, called sessions, between
devices. It is responsible for opening sessions, ensuring they remain open and functional while
data is being transferred, and closing them when communication ends. The session layer can also
set checkpoints during a data transfer.
6. Presentation Layer: The presentation layer prepares data for the application layer. It defines how
two devices should encode, encrypt, and compress data so it is received correctly on the other end.
The presentation layer takes any data transmitted by the application layer and prepares it for
transmission over the session layer.
7. Application Layer: The application layer is used by end-user software such as web browsers and
email clients. It provides protocols that allow software to send and receive information and present
meaningful data to users.
One of the main benefits of OSI Model is that it clearly distinguishes between services, interfaces and
protocols. Hence devices or equipment from different computers can work together in the single network.
Each layer defines a set of functions in data communication. As a result, troubleshooting is easier. Also,
this model supports connection oriented and connectionless services.
OSI model is too complex compare to TCP/IP which is more optimized and effective. Session and
presentation layers are hardly used. Data link layer and network layer functionalities are split into several
layers. It is not adopted for all the telecommunication applications used on the computer. Also due to
complexity of model, initial implementations is time consuming and slow.
TCP/IP
TCP/IP is a data link protocol used on the internet to allow computers and other devices to send and
receive data. TCP/IP stands for Transmission Control Protocol/Internet Protocol. It makes computers and
other devices that are connected to the internet to communicate with one another across networks.
Originally developed in the 1970s by DARPA (the Defense Advanced Research Projects Agency) in the
US, TCP/IP started out as just one of many internet protocols. The TCP/IP model later became the standard
protocol for ARPAnet, the modern internet’s predecessor. Today, TCP/IP is the global standard for
internet communications. (avg.com, 2021)
1. Datalink Layer: The datalink layer defines how data should be sent, handles the physical act of
sending and receiving data, and is responsible for transmitting data between applications or devices
on a network. This includes defining how data should be signed by hardware and transmission
devices on a network.
2. Internet Layer: The internet layer is responsible for sending packets from a network and
controlling their movement across a network to ensure they reach their destinations. It provides
the functions and procedures for transferring data sequence between application and devices across
networks.
3. Transport Layer: The transport layer is responsible for providing a solid and reliable data
connection between the original application or device and its intended destination. This is the level
where data is divided into packets and numbered to create a sequence. The transport layer then
determines how much data must be sent, where it should be sent to, and at what rate.
4. Application Layer: The application layer refers to programs that need TCP/IP to help them
communicate with each other. This is the level that users typically interact with, such as email
system and message platforms. It combines the session, presentation, and application layers of the
OSI Model.
TCP/IP Model assigns an IP address to each and every computer on the internet, thus making each device
to be identifiable over the network. It is an open protocol suite. It is not owned by any particular institute
and so can be used by any individual or organization. It is scalable, client-server architecture. This allows
networks to be added without disrupting the current services. Also, this type of model is an industry
standard model that can be effectively developed in networking problems.
TCP/IP Model is not generic in nature. So, it fails to represent any protocol stack other than the TCP/IP
suite. For example, it cannot describe the Bluetooth connection. It does not clearly separate the concepts
of services, interfaces, and protocols. So, it is not suitable to describe new technologies in new networks.
It was originally designed and implemented for wide area networks. It is not optimized for small networks
like LAN (local area network).
TCP/ IP model is based on standard protocols OSI is a generic, protocol independent standard,
around which the internet has developed. It is acting as a communication gateway between the
a communication protocol, which allows network and end user.
connection of hosts over a network.
In TCP/ IP model the transport layer does not In OSI Model the transport layer guarantees the
guarantees delivery of packets. delivery of packets.
In TCP/ IP Model, physical and data link In the OSI Model, the data link layer and physical
layer are both combined as a single host-to- layer are separate layers.
network layer.
TCP/ IP does not have a separate Presentation OSI Model has a separate Presentation Layer and
Layer and Session Layer. Session Layer.
In TCP/ IP Mode replacing protocols is not Protocols are hidden in OSI Model and are easily
easy. replaced as the technology changes.
The Network layer in TCP/IP model provides Network Layer of OSI Model provides both
connectionless services. connection oriented and connectionless service.
TCP/IP model does not fit any protocol. OSI model has a problem of fitting the protocols
into the model.
In TCP/ IP Model services, interfaces and OSI Model defines services, interfaces and protocols
protocols are not clearly separated. very distinction between them.
Network Protocol are set of established rules that determines how different devices in the same network
communicate and transmit data to others other. It helps to effectively communicate connected devices to
each other regardless of the difference in their internal process, structure, design or standards. To
successfully send and receive information on the network, devices on the both sides must accept and
follow protocol convention. Without computer protocols, computers and other devices on both sides of a
communication would not know how to communicate and transmit data with other. As a result, very few
specialty networks that are built around a specific architecture would able to function, and the internet
would not exist like today. Essentially, al network users rely on network protocols for connectivity. They
play a very important role in modern digital communication and make it possible to easily communicate
all over the world. Similar to the way that speaking the same language helps to communicate faster and
convenient between two people, network protocols make it possible for devices within the network to
interact with each other because of predetermined rules that are built within the devices either it is software
or hardware. Network protocols aren’t only relevant to the certified network specialists or IT
professionals. Billions of people around the globe use network protocols daily, whether they know about
it or not. Every time we use the internet, we leverage network protocols. Thought, you may not know how
network protocols work or how frequently you encounter them, they are necessary for using the internet
or digital communication in any capacity. Network protocols take large-scale processes and break them
down into small, specific tasks or functions. This occurs at every level of the network, and each function
must cooperate at each level to complete the larger task at hand. The term protocol suite refers to a set of
smaller network protocols working in conjunction with each other. Network protocols are typically created
according to industry standard by various networking or information technology organizations. It is also
very important to have defined and standardized protocols within the network that help different systems
to work together, i.e. they will be able to be inter-operable. This means that you do not need to procure all
equipment from one vendor as was the case a few decades ago. Also network standard makes it possible
for different manufacturers network components to work together Without which the entire network
environment will fail and it is hrad to imagine today’s digital world as we know it.
3) Topology
Introduction: Network topology refers to the layout of a computer network. It can be used to define or
describe the arrangement of various types of telecommunication networks, including command and
control radio networks, industrial field busses and computer networks. It is an application of graph
theory wherein communicating devices are modeled as nodes and the connections between the devices
are modeled as links or lines between the nodes.
In computer networks, there are mainly two types of topologies, they are:
• Physical Topology:
A physical topology describes the way in which the computers or nodes are connected with each other
in a computer network. It is the arrangement of different elements including the device location and
code installation of a computer network. In other words, it is the physical layout of computer,
workstation and cables in the network. (afteracademy.com, 2020)
• Logical Topology:
A logical topology describes the way, data flow from one computer to another. It is bound to a network
protocol and describes how data is moved throughout the network and which path it takes. In other
words, it is the way in which the devices communicate internally. (afteracademy.com, 2020)
A computer network is mainly divided into six types based on physical topology, they are:
❖ Bus Topology
Bus topology is the simplest form of topology in which a common bus or channel is used for
communication in the network. The bus acts as the backbone of the network, which joins every computer
and peripherals in the network. The data is sent only one direction and as soon as it reaches the end, the
terminator removes the data from the communication lines (to prevent the bounce of the signal and
disruption of data flow). (afteracademy.com, 2020)
In bus topology, nodes are directly connected to the cable without passing through a hub. Therefore, the
initial cost of instillation is low. It is a familiar technology as the instillation and troubleshooting technique
are well known, and hardware components are easily available. Also, a failure of a single node does not
have any effect on other nodes or a network.
Although a bus topology is quite simpler, it still requires a lot of cabling. If any two nodes send the
message simultaneously, then the signal of the both nodes collide with each other that can reduce the
processing speed of the network. Also adding new devices to the network would slow down the network.
❖ Ring Topology
Ring Topology is a topology in which each computer is connected to exactly two other computers in the
form of the ring. The message passing is unidirectional and circular in nature. This type of network
topology is deterministic in nature i.e. each computer is given access for transmission at a fixed time
interval. All the computers or nodes are connected in a closed-based loop. (afteracademy.com, 2020)
Ring topology is a very reliable network due to the dependent of the communication system on the single
host computer. In this type of topology many hardware and software tools for network operation and
monitoring are easily available and the faulty devices can be removed from the network without bringing
the network down.
The main drawbacks of this type of network is that it requires specialized test equipment to determine the
cable faults. If any fault occurs in the cable, then it would disrupt the communication for all the nodes.
The breakdown of a single station leads to the failure of the overall network.
❖ Star Topology
Star topology is a computer network topology in which all the nodes are connected to a centralized hub.
The hub or switch acts a middleware between the computers in a network. Any node requesting for
services or providing service, first contact the hub for communication. The central device has point to
point communication link with other devices that broadcast or unicast the message based on the central
device used. (afteracademy.com, 2020)
Complex network features can be easily implemented in the star topology. Any changes made in the star
topology are automatically accommodated. As each station is connected to the central hub with its own
cable, therefore failure in one cable will not affect the entire network. Also, it can be easily expandable as
new stations can be added to the open ports on the hub.
In star topology sometimes, cable routing becomes very difficult when a significant amount of routing is
required. There is also the problem of server breakdown when the central hub or switch goes down, then
all the connected nodes will not be able to communicate with each other.
❖ Mesh Topology
Mesh Topology is a type of a computer network topology in which every node are interconnected with
each other through various redundant connections. In order words, direct communication between the
nodes in the network. It does not contain the switch, hub or any central computer which acts as a central
point of communication. (afteracademy.com, 2020)
The mesh topology networks are very reliable network topology compared with other networks as if any
link breakdown does not affect the communication between connected computers. The rate of
communication is also comparatively very high between the nodes. Adding new devices would not disturb
the communication between other devices.
A mesh topology contains a large number of connected devices such as a router and more transmission
media than other topologies that is very expensive to setup. In this topology, redundant connections are
also very high that reduces the efficiency of the network.
❖ Tree Topology
Tree topology is a computer network in which all the nodes are directly or indirectly connected to the
main bus cable. It is the combination of Bus and Star topology. In tree topology, the whole network is
divided into segments, which can be easily managed and maintained. There is a main hub and all other
sub-hubs are connected to each other in this topology. (afteracademy.com, 2020)
In tree topology, the whole network is divided into segments known as star networks which can be easily
managed and maintained. It is easily expandable as we can add the new device to the existing network.
Also, it has point to point writing for individual segments that reduces the error detection and error
correction in the network.
A tree topology is very difficult to reconfigure when new devices are added. If any fault occurs in the
node, then it becomes difficult to troubleshoot the problem. The whole network fails when there is failure
in main bus cable.
❖ Hybrid Topology
A Hybrid topology is a computer topology which is a combination of two or more topologies. In practical
use, they are the most commonly used topology in the world. In this topology, all topologies are
interconnected according to the needs to form a hybrid. All the good features of each topology can be used
to make an efficient hybrid topology. (afteracademy.com, 2020)
The size of a hybrid network topology can be easily expanded by adding new devices without affecting
the functionality of the existing network. This topology is very flexible as it can be designed according to
the requirement of the organization. If a fault occurs in any part of the network it will not affect the
functioning of the rest of the network.
The main drawback of the hybrid topology is the design of the network. It is very difficult to design the
architecture of the Hybrid network. The Hubs used in the Hybrid topology are very expensive as these
hubs are difficult from usual Hubs in other technologies.
4) Networking Devices
Introduction: The hardware devices which are employed for establishing a connection of fax machines,
computers, printers, and other electronic equipment with that of the network are termed as network
devices. Through network devices, the information can be transferred in a more quick and exact approach
across similar or various kinds of networks. These devices can be of either intra or interconnected type.
Few of the devices are connected on the devices such as RJ45 connector and NIC cards, while few devices
are installed on the devices like switches, gateways, routers, and others. (watelectronics.com, 2021)
❖ Hubs
Hub is the simplest networking device that is widely used to connect LAN components with identical
protocols. It acts as a repeater in the sense that it amplifies signals that deteriorate after travelling long
distance over connecting cables. A hub can be used with both digital and analog data, provided its setting
have been configured data in digital format. (blog.netwrix.com, 2019)
Operating Principle
On receiving a packet of data, hubs do not perform packet filtering or addressing functions, they just send
data packets to all connected devices. They do not have the necessary intelligent to find the best path for
data package which leads to bandwidth wastages.
❖ Switch
Switch is a network device that connects other devices to Ethernet networks through twisted pair cables.
It uses packet switching technique to receive, store and forward data packets on the network. The switch
maintains a list of network addresses of all the devices connected to it. Data transmission speed in switches
are double than that of other networking devices like hubs. (tutorialspoint.com, 2021)
Operating Principle
On receiving a packet, it checks the destination address and only transmits the packet to the desired
destination. Before forwarding, the packets are checked for collision and other network errors. The data
is transmitted in full duplex mode. It reduces network traffic.
❖ Repeater
A repeater is an electronic network device that amplifies the signal it receives. It receives a signal and
retransmits it at a higher level or higher power so that the signal can cover longer distance more than 100
meters for standard LAN cable. This is the type of network device that functions at the OSI physical layer
also termed signal boosters. (blog.netwrix.com, 2019)
Operating Principle
A repeater regenerates the signal over the same network before the signal becomes too weak or corrupted
to extend the length of transmitted signal. When the signal becomes weak, they copy the signal bit by bit
and regenerate it at the original strength.
❖ Modem
Modem is a device that enables a computer to send or receive data over telephone or cables lines. The data
on the computer is digital whereas a telephone or cable lines can transmit only analog data. The main
function of the modem is to convert digital signal into analog and vice versa. It is combination of two
devices – modulator and demodulator. The modulator converts digital data into analog data whereas
demodulator converts analog data into digital data. (blog.netwrix.com, 2019)
Operating Principle
Modem converts digital signals into analog signals of different frequencies and transmits it to a modem at
the receiving location. The receiving modem performs the reverse transformation and provides a digital
output to a device connected to a modem, usually a computer.
❖ Router
A router is a networking hardware device that transmits data from one LAN to another if both networks
support the same set of protocols. It is mostly connected to at least two LANs and Internet Service Provider
(ISP). It receives its data in the form of packets, which are data frames with their destination address.
Routers also strengthens the signals before transmitting them. Therefore, it is also called repeater.
(tutorialspoinnt.com, 2020)
Operating Principle
Routers establish communication by maintaining tables about destinations and local connections. A router
contains information about the systems connected to it and where to send requests if the destination isn’t
known. Routers usually communicate routing and other information using one of three standard protocols.
Routing Information Protocol, Border gateway protocol, or Open Shortest Path First.
❖ Gateway
Gateway is a network device used to connect two or more dissimilar networks. A gateway usually is a
computer with multiple NICs connected to different networks. A gateway can also be configured
completely using software. As networks connect to a different network through gateways, these gateways
are usually hosting or end points of the network. (tutorialspoinnt.com
Operating Principle
Gateway uses packet switching technique to transmit data from one network to another. In this way it is
similar to a router, the only difference being router can transmit data only over networks that use same
protocols.
❖ Firewall
A firewall is a network security device that monitors all incoming and outgoing traffic based on a defined
set of security rules. It is either hardware or software-based device that accepts, rejects, or drops the
specified traffic. The main role of firewall is to establish a barrier secured internal networks and outside
untrusted network, such as the internet. (geeksforgeeks.org, 2019)
Operating Principle
Firewall match the network traffic against the set of defined rules. Once the rule is matched, associate
action is applied to the network traffic. Rules can be defined in the firewall based on the necessity and
security policies of the organization.
❖ VPN Concentrator
A VPN concentrator is a type of networking device that establishes multiple encrypted VPN tunnels at the
same time and provides a secure and encrypted connection between different VPN nodes. It is a type of
router device, build specifically for creating and managing VPN communication infrastructures. A VPN
Concentrator can create secure connection across a TCP/ IP network such as the internet.
(privacyaffairs.com, 2021)
Operating Principle
VPN Concentrator use tunneling protocols to create and manage VPN tunnels. It encapsulates the outgoing
network data into encrypted packets and then transmits the data through the VPN tunnel. It receives
incoming data, de-encapsulating and decrypting the data.
❖ Packet Shaper
Packet Shaping is a congestion management technique that regulates network data transfer by allowing
the flow of higher-priority traffic at optimal levels and delaying the flow of less important or less desired
packets within the network. It is used to optimize network performance by prioritizing certain traffic flows
and ensuring the traffic rate does not exceed the bandwidth limit. (techtarget.com, 2020)
Operating Principle
It creates a bandwidth limit for less critical packets, packet shaper lessens the possibility that more
important packets will be delayed or dropped as they leave the interface. It gives priority to time-sensitive
data over traffic that can be delayed briefly, often with little-to-no ill effect.
5) Computer Server
Introduction: A server is a very powerful computer or system that provides resources, data, services or
programs to other computers and users over a network. It can be a computer, hardware device, or a
computer program that is loaded so that it can send data and any information to other computers. The
device that receives requests and response from the server is called a client. They have more storage,
memory and processing speed than a normal workstation computer. A single server can serve multiple
clients and a single client can use multiple servers. (digitalworld839.com, 2021)
❖ Web Server
A web server is a server that runs on websites. It is also called a computer program. The main function of
web server is to store, process and deliver data provided by the user. Whenever we search on the internet
through web browsers, it receives the request for the URL and then web server sends the data according
to the need of the user. These types of servers mainly show the data in the format like images, text, videos,
etc. (digitalworld839.com, 2021)
❖ Database Server
A database server is a computer system that provides services related to accessing and retrieving data from
database to other computers. These types of server are similar to the warehouse, where the website's data
and information are stored and maintained. Many companies use database server to store the data. Users
access the data using query labels related to the database. (digitalworld839.com, 2021)
❖ File Server
A file server is a network that helps to transfer the stored files. The file server stores and manages all the
files in a computer and sends a copy of the file to the other computer on the request of the users. It shares
the storages of computer files such as documents, sound files, photographs, images, databases, etc. These
types of server are mainly used in the local network. (digitalworld839.com, 2021)
❖ Application Server
Application server is a framework for a computer environment where application runs. It includes a server
operating system (OS) and server hardware that provides computing-intensive operations and other
services to the application. This type of server is widely used to develop and run a web-based application.
The key features of an application server include data redundancy, data/application security, high
availability, user management, etc. (digitalworld839.com, 2021)
❖ Virtual Server
Virtual Server is a kind of server that is mostly located on an offsite data center that shares hardware and
software resources to multiple users so that each user has control over it. It is a method of converting one
physical server into multiple virtual machines to take the full advantage of a server's processing power
and allowing a number of different users to share the cost of equipment. It provides very cost effective
and faster resource control. (netstandard.com, 2021)
❖ Terminal Server
A terminal Server is a hardware device or server that connects devices with a serial port to a local or Wide
Area Network (WAN). Terminal Servers are very simple devices that do not provide any security
functionality, such as data encryption and user authentication. The main function of this device is to enable
serial devices to access network server applications, or vice versa where security of the data on the LAN
is not generally an issue. (searchvirtualdesktop.techtarget.com, 2019)
Email Server
An email server is a type of server that receives emails from the sender and sends emails to the receiver
and also stores all the details and messages of the users’ account on the server. The email server is also
known as mail server transfer agent or MTA or internet mailer. When we send a mail or send a message
to someone through a network, it first accesses to SMTP or simple mail transfer protocol and then
identifies the address of the person whom you want to send mail and then the mail goes to the recipient.
Basically, email servers act as a virtual post office (Digitalworld839, 2021).
Networking hardware is the physical components of an analog or digital computer that is used for
communication and interaction between various components of a computer network. The
term hardware distinguishes the tangible aspects of a computing device from software, which consists of
written, machine-readable instructions or programs related to the interconnection of computer equipment
and applications necessary for computer networks. The programs make communication between
computers within the network possible, share hardware and software resources and help control the
security of the system. Essentially, computer software controls computer hardware. Hardware and
software are complementary and cannot act independently of one another. A computing device can
function efficiently and produce useful output only when both hardware and software work together
appropriately. Without software, computer hardware is useless. Conversely, computer software cannot be
used without supporting hardware. Similarly, computer software must first be loaded into the computer's
hardware and then executed. Software runs on hardware. Software without hardware are useless and does
nothing at all.
A workstation computer is faster and more capable computer than other personal computer that are
intended for individual use. Also, they have their own application installed and their own hard disk storage
they can also be used independently of the mainframe or the server. However, when the workstation
computer needs to use a network component like a printer, the server will have to communicate with
network component on behalf of all the workstation computers. This may lead to increase in traffic within
the network and slow the entire system. Also, server workstation computer has to wait until server
hardware provides the data when requested since all the network computers are using the server hard disk,
CPU, Memory, etc. Therefore, increasing the number of workstation computer within the network can
increase the independence of workstation hardware. Hence, it is very essential to install very reliable
hardware and software components in the server, and implement proper backup and maintenance
techniques for the server.
Specifications Lenovo Think System Acer AT350 F1 Tower PowerEdge T640 Tower
ST550 Tower Server Server Server
As a network administrator in the NIC Asia Bank it is my first priority to look after everything in the
network configuration. Firstly, a network connection within the company must be established. In addition,
for the set-up, management and maintenance of the network and IT system of the headquarters and the
branch office, we will select Lenovo Think System ST550 Tower Server. The cost of the server is within
the limitation of the price set by the company. It is a better and more affordable form of server compared
to Acer AT350 F1 Tower Server and Power Edge T640 Tower Server. Since our bank allocated few
millions IT department expenditures, it will not be financially possible to purchase very expensive server.
But the cost effectiveness and features that came along with the server that we have selected suites all the
needs of the company. Some of the highlights of the Lenovo Think System ST550 Tower server are:
• Optimized system design to meet performance and cost points for almost any workload
• The latest processor and memory technologies, along with NVMe drives, offer tremendous
performance
• Advanced security technologies, including lockable bezel, Kensington lock slot, chassis intrusion
switch, and TPM 1.2/2.0
• Office-quiet acoustics and compact size make it ideal for under-desk, deskside, or data center
rack-mount use
Selection of Topology for the Networked System of the NIC Asia Bank Branch
Depending upon the size of the network and the numbers of clients of the bank, topology can be different
from one network to other. But for the Gauradha, Jhapa Branch we have chosen Star Topology to meet
the requirements of the company. Star topology is one of the most common and oldest topologies in the
local area network. The design of the star topology is very similar to the telecommunication system. In
telephone system all telephones calls are managed by the central switching station similar to star topology
where each devices of the network are connected to the central node which is also known ass hub. Hub is
a central device with a number of links that broadcast data to every connected device on the network. All
the data passes through the hub. When a packet is transmitted to the hub it moves that packets to all the
nodes linked through the hub but only one node at a time Different types of cables can be used to link
computers such as twisted pair, coaxial cable and fiber optics. But for the sake of our project we are using
unshielded twisted pair copper cabling on our network. One end of the cable is plugged in local area
network while the other side is connected with the hub. Also, due to the centralization of star topology it
is easy to monitor and handle the network making it more advantageous than other topology like bus
topology, mesh topology, ring topology, etc. Following is the diagram to illustrate star topology on our
network.
1. Star topology helps to isolate individual devices simple by connecting each device to the central
hub and prevents any non-centralized failure from affecting the network.
2. The topology is very easy to understand, establish and navigate.
3. In a star topology, each network device has separate cabling to the network hub, giving each device
a separate connection to the network. If there is a problem with a cable, it will not generally affect
the rest of the network.
4. We can easing add and remove new computer or devices to the network by just extending a cable
from the hub without interrupting other nodes.
5. It helps to reduce the chance of a network failure by linking all of the networking devices to the
central hub. Therefore, all computers can communicate with all others by transmitting and
receiving from the central node only.
6. It is also one of the fastest network topologies and helps to reduce network traffic.
Although the star topology has many advantages than other topology, it also has some drawbacks. The
primary disadvantage of the star topology is that the hub is the single point of failure, if the central hub
encounters a problem then the whole network falls short. Also, the performance and scalability of the
network also depend on the capabilities of the hub. Hence, it is very important to ensure that the hub is
always working and extra security features should be added to the Hub. Also, to improve performance of
the network a very powerful central device must be added to the network.
Conclusion
In this section I have prepare a report on the concepts related to the networking principles and topology,
devices and their operating principles. I have compared three different server that are available on the
market and chosen a best server based on the cost and performance optimization. I have likewise proposed
a star topology for the branch of NIC Asia Bank based on the scenario. Also, I have shown some of the
advantages of the Star topology that makes it the best topology for our networked system.
Part 2
For the branch of NIC Asia Bank at Gauradha, Jhapa. I have assigned the network of 200.100.50.0/27 and
its network details are as follows:
The router is set with the IP address of 200.100.50.1. In the DHCP server pool, IP addresses from
200.100.50.11 – 200.100.50.30 are characterized among the accessible hosts. The DHCP server pool also
assigns IP addresses to each client’s computer of various departments consequently and the rest are
configured as static for servers and networking devices.
IP Address Design for NIC Asia Bank’s Gauradaha Branch Office are as follows:
Network Requirements
Performance Requirements
It is very important to meet the performance requirements of the network to enhance the performance of
the network system ensuring user satisfaction with minimum downtime period for backup and
maintenance. In the network system, Windows server running on a high-end computer with minimum
processor of 2.4 GHz and 16 GB must be build. All the hardware and software must be configured with
the latest version. To make the networking system more efficient MySQL server can be used on the
network back-end and the main server must be maintained and updated constantly.
Feedback Form
Description of Project: - It is the network design of a branch of NIC Asia Bank at Gauradaha, Japan.
The branch office is connected to the center office at Kathmandu through Internet and VPN Services.
The topology used in the design is Star topology. First of all, a router is connected to the Internet using
Firewall and switches are connected to the router to connect other networking devices like workstation
computers, servers, access points and IP phones.
1. Have all the system requirements been All the network system and devices are
met? explained very clearly.
Significance of the project: - It is very important to design the network first before implementation. It
helps to solves the problems that may arrives while establishing network. It also helps to meets the
requirements of the client’s during the designing phase.
Project Limitation: - It does not show the design to connect every computer on each department with
the central hub and there enough server to handle the performance of the network. Although, a star
topology is more advantages than other topology. There are some drawbacks. First of all, the major
problem of the topology id the center hub, if the central hub fails it causes failure of the network. Hence
it is very essential to install very reliable maintenance schedule and security features on the network.
Feedback Evaluation
Lab Report
In this lab report I will be installing and configuring different servers through Windows Server 2012 R2.
The Servers are AD DS server, DNS Server, DHCP Server, VPN Server and Print Server. Below I will be
providing each and every step for the documentation of the servers with evidence. I will be installing,
assigning IP and configuring the required servers to run the network of the bank smoothly and effectively
meeting all the user requirements.
Active Directory Domain Services (AD DS) is a server role in Active Directory that allows admins to
manage and store information about resources from a network, as well as application data, in a distributed
database. AD DS helps admins manage network elements- both computing devices and users- and reorder
them into a custom hierarchical structure. AD DS also integrates security by authenticating logons and
controlling access to directory resources. It is a server that runs on Microsoft Windows Server to identify
and access management. AD DS stores and organize information about the people, devices and servers
connected to a network. AD DS serves as a locator service for those objects and as a way for organizations
to have a central point of administration for all activity on the corporate network.
(searchwindowsserver.techtarget.com, 2021)
i. Server OS
ii. Static IP
I have already installed Windows Server 2012 R2 that is the sixth version of the Windows Server
Operating System by Microsoft, as part of the Windows NT family of operating system. In the server
operating system I will manually install different roles and features available as per our requirements. To
install and configure AD DS we also require static IP address to add active directory domain services’
features on our network.
Step 1: Open Run on the server OS and type “ncpa.cpl” and hit enter.
Step 2: On the Network Connection windows right click on Ethernet0 and click on Properties on the drop-
down menu.
Step 3: Now a new window opens. Find the Internet Protocol Version4 (TCP/IPv4) from the items list and
double click on it.
Step 4: This will bring up new Internet Protocol Version4 (TCP/IPv4) Properties windows. Select use the
following IP address and type IP address and subnet mask. Then type preferred DNS server and click ok.
After this click on OK again to complete.
Step 2: Click on manage and select add roles and features from the drop-down menu.
Step 3: The add roles and features wizard will open. After that click on Next.
Step 4: This takes us to Select instillation type section. Select the first option that is “Role-based or
featured-based installation” and click on Next.
Step 5: This takes us to Select destination server. Select the local server and click on Next.
Step 6: This takes us to Select server roles section. From the role menu select the Active Directory
Domain Services chat-box.
Step 7: After we have selected the Active Directory Domain Services chat-box other windows will open.
Click on Add features and click on Next.
Step 9: This takes us to ADDS Server section that gives some of the information about ADDS server.
After that click on Next.
Step 10: Here it says Conform installation sections. Select the chat-box “Restart the destination server
automatically if required “and Click Yes and then Install.
Step 12: After that from the notification section click on Promote this server to a domain controller
option.
Step 13: This opens an Active Directory Domain Services Configuration Wizard. Select Add a new
forest button, type a root domain name and click on Next.
Step 14: After that a Domain Controller Option will open. Type a strong password for the root domain
and click on Next.
Step 16: Now an Addition Options section will open. Verify the domain NetBIOS name of the domain
and click on Next.
Step 17: This takes us to Paths section. Specify the location of the AD DS server and click on Next.
Step 19: Now a Prerequisites Check section will open. Click on Install to begin an installation of AD DS
Server.
❖ DNS Server
The DNS is a system of records of domain names and IP address that allows browsers to find the right IP
address that corresponds to a hostname URL entered into it. When we try to access a website, we generally
type in their domain names, like google.com or amazon.com or dell.com, into the web browser. Web
server however need to know the exact IP address to load content for the website. The DNS is what
translates the domain names to the IP address so that the resources can be loaded from the website’s server.
The DNS is responsible for converting the hostname, what we commonly refer to as the websites or web
page name, to the IP address. The act of entering the domain name is referred to as a DNS query and the
process of finding the corresponding IP address is known as DNS resolution. (cdnetwork.com, 2021)
i. Server OS
ii. Static IP
Step 2: Click on manage and select add roles and features from the drop-down menu.
Step 3: The add roles and features wizard will open. After that click on Next.
Step 4: This takes us to Select instillation type section. Select the first option that is “Role-based or
featured-based installation” and click on Next.
Step 5: This takes us to Select destination server. Select the local server and click on Next.
Step 6: This takes us to Select server roles section. From the role menu select the DNS server chat-box.
Step 7: After we have selected the DNS chat-box other windows will open. Click on Add features and
click on Next.
Step 9: This takes us to DNS Server section that gives some of the information about DNS server. After
that click on Next.
Step 10: Here it says Conform installation sections. Select the chat-box “Restart the destination server
automatically if required “and Click Yes and then Install.
Step 12: After that from the server manager window click on tools and then click on DNS.
Step 13: On the DNS windows click on the arrow sign besides the server name.
Step 14: Right click on server name and click on New Zone.
Step 15: This will take us to New Zone Wizard. Click on Next.
Step 16: This takes us to Zone Type section. Select the Primary zone option and click on Next.
Step 17: This bring us to Forward or Reverse Lookup Zone. Select the Forward lookup zone and click
on Next.
Step 18: Now we are at Zone Name section. Type the name of the new zone and click on Next.
Step 19: This takes us to Zone File section. Check the file name and click on Next.
Step 20: This brings us to Dynamic Update section. Click on “Do not allow dynamic updates” option
and click on Next.
Step 22: To create a new host on DNS Server. First select on the Zone Name that we have created, right
click on the window and select New Host (A or AAAA) from the drop-down menu. Then click on Next.
Step 24: This brings up New Host windows. Enter the Name and IP address of the host and click on
Next.
Step 25: After you have entered Name and IP address of the host click on Add host. This will bring up
another window, click on OK.
Dynamic Host Configuration Protocol (DHCP) is a client/ server protocol that automatically provides an
Internet Protocol (IP) host with its IP address and other related configuration information such as the
subnet mask and default gateway. Every device on a TCP/IP-based network must have a unique unicast
IP address to access the network and its resources. Without DHCP, IP addresses for new computers or
computers that are moved from one subnet to another must be configured manually; IP addresses for
computers that are removed from the network must be manually reclaimed. With DHCP, this entire
process is automated and managed centrally. The network administrator establishes DHCP servers that
maintain TCP/IP configuration information and provide address configuration to DHCP-enabled clients
in the form of a lease offer. (docs.microsoft.com)
Followings are the Steps of installing and configuring DHCP server on Windows Server 2012.
Step 2: Click on manage and select add roles and features from the drop-down menu.
Step 3: The add roles and features wizard will open. After that click on Next.
Step 4: This takes us to Select instillation type section. Select the first option that is “Role-based or
featured-based installation” and click on Next.
Step 5: This takes us to Select destination server. Select the local server and click on Next.
Step 6: This takes us to Select server roles section. From the role menu select the DHCP server chat-box.
Step 7: After we have selected the DHCP chat-box other windows will open. Click on Add features and
click on Next.
Step 9: This takes us to DHCP Server section that gives some of the information about DHCP server.
After that click on Next.
Step 10: Here it says Conform installation sections. Select the chat-box “Restart the destination server
automatically if required “and Click Yes and then Install.
Step 12: After that from the server manager window click on tools and then click on DHCP.
Step 13: On the DHCP server windows click on the arrow sign besides the server.
Step 14: Here it shows two types of DHCP options. The first one is IPv4 and the other one is IPv6. Now
click on the arrow sides besides the IPv4.
Step 16: This will take us to new wizard scope. Click on Next to continue.
Step 17: This take us to Scope name section. Enter the name and the description of the scope and click
on Next.
Step 18: This takes us to IP Address range section. Enter the IP address range that will be distributed to
the clients and click on Next.
Step 19: This takes us to Add exclusion and delay section. Add the IP address you want to exclude and
click on Next.
Step 20: Now we are at Lease Duration Section. Select the duration for the scope lease and click on
Next.
Step 21: This takes us to Configure DHCP options, Select the first option and click on Next.
Step 22: This brings us to Router Configuration section. Add the address of a router to be used by the
clients and click on Next.
Step 23: This takes us to domain name and DNS server section. Add DNS IP address and click on Next.
Step 24: This takes us to Wins server section. Don’t change and click on Next.
Step 25: This bring us to Active scope section. Select the first option and click on Next.
Internet Information Services is a flexible, general-purpose web server from Microsoft that runs on
Windows systems to serve requested HTML pages or files. An IIS web server accepts requests from
remote client computers and returns the appropriate response. This basic functionality allows web servers
to share and deliver information across local area networks (LAN), such as corporate intranets and Wide
Area Network (WAN), such as the Internet. (searchwindowserver.techtarget.com, 2019)
Step 1: Open File Explorer and creates a folder named “NIC Asia” in C;/ and inside the folder create a
text document named “NIC Asia.html”.
Step 2: Open the NIC Asia.html file and write some content for the website.
Followings are the Steps of installing and configuring Web Server and IIS Server.
Step 2: Click on manage and from the drop-down menu select the add roles and features menu.
Step 4: This brings us to Select installation type section. Select the first option and click on Next.
Step 5: Now we are on Select destination server section. Select the local server and click on Next to
continue.
Step 6: This takes us to Select server roles section. From the role’s menu select the Web Server (IIS)
server chat-box.
Step 7: After we have selected the web server chat-box it will bring up another windows. Click on Add
feature and click on Next.
Step 9: This brings us to Web Server Roles (IIS) section that gives some of the information about IIS.
Click on next to continue.
Step 10: Now we are at Select role services section. Click on Next to continue.
Step 11: Here it says Conform installation selections. Select the chat-box “Restart the destination server
automatically if required” click on Yes. Then click on Install.
Step 13: After that from the server manager click on tools and click on Internet Information Services
(ISS) Manager
Step 14: On the IIS Manager windows click on the arrow sign besides the server.
Step 15: Now right click Sites and select Add Websites.
Step 16: Then Add websites window opens up, enter the website name under the site name field and
click the button under the Physical path option and browse the destination of the folder containing the
.html file and click on Next.
Step 17: Then close the IP address of the website under the Binding menu and click Ok.
Step 18: Now on the IIS Manager window click on the website name and click on the Default Document
in Home.
Step 19: After that remove all the default documents on the windows by right clicking on them and
selecting Remove menu. Select Yes on the Conform Remove pop-up window.
Step 20:After deleting all the default documents, right click on Default Document and click on Add
menu.
Step 21: Then enter the filename of the .html file on the Add Default Document windows and click on
OK.
Step 22: Then new default document will be added in the Default Document page.
Step 23: Now open the Internet Explorer and enter www.nicasia.com.np address and press enter. This
will open the website and we can view the content of the site.
Print Server
A print server is a mechanism that provides adequate management and control when we have a fleet of
devices, multiple printers, or geographically distant office locations. They are high-powered applications
or software that helps organizations manage files in a printing queue and facilitate the user-printer
workflow. Print server can be physical or cloud-based systems that connect devices to specific network
printers. At first glance, print servers might seem like a simple network system — users submit requests,
and the server enables the reproduction of the file on a physical printer. More than that, print servers are
network-level devices that administrators can configure to set policies for users, devices, printers, and
features. These configurable features include color printing quotas, departmental authentication,
watermarking printed documents, blocking access to specific printers, and more. (serverwatch.com, 2021)
Requirements
i. Printer
ii. Server OS
Followings are the Steps of installing and configuring Print Server on Windows 2012 R2.
Step 2: Click on manage and select add roles and features from the drop-down menu.
Step 3: The add roles and features wizard will open. After that click on Next.
Step 4: This takes us to Select instillation type section. Select the first option that is “Role-based or
featured-based installation” and click on Next.
Step 5: This takes us to Select destination server. Select the local server and click on Next.
Step 6: This takes us to Select server roles section. From the role menu select the Print and Document
Services chat-box.
Step 7: After we have selected the Print and Document Services it will bring up another window. Click
on add feature and click on Next to continue.
Step 9: This takes us to Print and Document Services section that provides some of the information
about the server. Click on Next to continue.
Step 10: Now we are at Select role services section. Select Print Server option chat-box from the roles
menu and click on Next.
Step 11: Here it says Conform installation selections Select the chat box “Restart the destination server
automatically if required”, click on Yes and then on Install.
Step13: After that from the sever manager click on tools and then click on Print Management.
Step 14: On the Print Management windows click on the Print Server.
Step 15: Now right click on Drivers and then click on Add Driver option.
Step 16: This will bring up Add Printer Diver Wizard. Click on Next to continue.
Step 17: This will take us to Processor Selection section. Select the first option and click Next.
Step 18: Now we are at Print Driver Selection section. Select the manufacture and model of the printer
driver to install and click on Next.
Step 20: Now right click on Printers and click on Add Printer menu.
Step 21: This will bring up new Network Printer Installation Wizard. Select the option as following and
click on Next.
Step 22: This takes us to Printer Address section. Type the IP Address of the network printer and click
on Next.
Step 23: Now we are at Printer Name and Sharing Setting section. Type the name of the printer and
sharing name. Then click on Next to continue.
Step 24: This takes us to Printer Found section. Click on Next to continue.
A Virtual Private Network (VPN) server is a physical or virtual server that is configured to host and deliver
VPN services worldwide. It is a combination of VPN hardware and software that allows VPN clients to
connect to a secure private network. The whole process is started when we run a VPN client on our
Windows Server. It connects us to the VPN server, and starts sending our traffic to it through our ISP.
However, all our data is encrypted by the VPN protocols the server is configured with and doesn’t allow
IPS to monitor it. (cactusvpn.com, 2021)
Requirements:
Followings are the steps to install and configure VPN server on Server Windows.
Step 2: Click on manage and select add roles and features from the drop-down menu.
Step 3: The add roles and features wizard will open. After that click on Next.
Step 4: This takes us to Select instillation type section. Select the first option that is “Role-based or
featured-based installation” and click on Next.
Step 5: This takes us to Select destination server. Select the local server and click on Next.
Step 6: This takes us to Select server roles section. From the role menu select the Remote Access chat-
box.
Step 9: This takes us to Select role services section. From the role services menu select DirectAccess
and VPN(RAS) chat-box.
Step 10: After we have selected the DirectAccess and VPN chat-box it will bring up another window.
Click on Add Feature option and click Next.
Step 11: Now we are at Web Server Role section. Click on Next to continue.
Step 12: This takes us to Server role services section. Click on Next to continue.
Step13: Here it says Conform installation selections. Select the chat-box “Restart the destination server
automatically if required”, click Yes and then Install.
Step 15: Now open Configure Remote Access window and select Deploy VPN only option.
Step 17: Right click on Server name and click on Configure and Enable Routing and Remote Access.
Step 18: This brings up new wizard Routing and Remote Access Server Setup. Click on Next to
continue.
Step 19: This takes us to Configuration section. Select Custom configuration option and click on Next.
Step 20: Now we are at Custom Configuration section. Select the VPN access option and click on Next.
Step 22: Again, right click on Server name and click on Properties.
Step 23: Now a new window will open. Click on IPv4 option on the top side of the window.
Step 24: Select static address pool. After we have selected the static address pool a new window will
open. Enter the range of IP address and click on OK.
After selecting all the hardware components, the suitable topology and completing the first phase of
designing the network of NIC Asia Branch Office, we had a meeting with the management team to discuss
and review the design for the Branch Office. On the meeting, we discussed about recognizing current and
future requirements of the Office to ensure the right design with potential for growth and expansion in the
future. Keeping in mind, the system and user requirements for each department, the design was thoroughly
reviewed and set accordingly. Next, we came up with an IP design for the network and IP addressing
range for users and hardware components of the branch office so that the clients from various locations
are able to access the network at their convenience.
To solve any issue related to the system during the first phase of development we reviewed the design and
performed a test to ensure the effectiveness of the system. The process of testing helps us to identify
different underlying problems and ensure that it meets the requirements set by the company. The proposed
design was also checked against the allocated budget and to benefit as much as customer as supported by
the network system. To make ensure that available manpower can handle the maintenance task, the
maintenance system was also tested. Since security plays a very important role in the networking system,
networking hardware and software were tested. To make sure that the network design could fulfill all the
requirements set by the clients the flexibility of the system was tested. After going through all the tests,
we were able to evaluate the drawbacks of the system and identify its problems.
Once we have completed the testing of the proposed design successfully, it was implemented on the office.
All the hardware components that were tested previously including devices like routers, firewalls,
switches, servers, workstation computer, printers, phone, etc. were connected to each other based on the
network blue print using twisted pair cable. After setting up all of the hardware components of the
network, the required servers were installed and configured accordingly.
After the completion of testing and implanting the proposed design, the security of the system, needs to
be diagnosed. The security check and the auditing of the entire network was done by diagnosing cyclic
redundancy check (CRC), input/output errors, dropped packets, data backup status, proper implementation
of security policies and upgrading and auditing. This helped us then check if the output of the network
design met the expected standards or not by diagnosing all the server status and working conditions.
Once the process of testing, implementation and diagnosis of the designed network, various positive and
negative aspects of the design were identified. The designed networks have a very good security system
due to the implementation of centralized network design and helps to resolves within a very short period
of time. All the workstation computers were isolated easily and helps to promote very high productivity
rate. All the data were stored in a centralized data storage ensuring easy data access and quality of security.
To protect the system against malware and viruses firewall are installed. Similarly, we installed VPN to
ensure the control of all data between branches office through VPN tunneling. This indicates our design
is very flexible and facilities many individual at a time.
No network is perfect, no matter how much you invest the time on configuring the networks. There is
always a chance of arising some issues. Having scheduled weekly or monthly maintenance helps the
company to lower the issues instead of having a higher hourly rate when an issue arises. Maintaining the
network is very important when we are using it every day and many factors can go wring ass any time.
Scheduled maintenance helps to keep big problems away and maintain the network’s optimal
performance. Following is the maintenance schedule for the three days of the network.
10am - Check and ensures that all the Check and ensure that all the Install and configure necessary
11am cables are working fine and unnecessary caches, files and server roles and features on the
remove faulty cables. programs are removed. network
11am - Pinning all the server with the Check and updates all of the Check on security programs and
12pm related clients to ensure all the client’s operating system if application within the network.
users are connected. necessary.
12pm - Troubleshoot any errors found Run antivirus and firewall inside Check the storage space of every
1 pm on the networking devices and the server to remove malware workstation computer and server.
server. and viruses.
1pm - Setting up the expiry date for Analyze the storage integrity of Check and ensure that DNCP
2pm every client’s password to client and server computers by server is proving necessary IP
ensure security. using the command ‘chkdsk’ address to the clients.
2pm- Check and test the backup Updates all the essential Secure all the DNS server on the
4pm recovery of the server. applications of the server if network and access control of
necessary. DNS Server.
4pm- Check that a effective security Check that all the networking Check and ensure that there is no
5pm system is configured and hardware and software are problem in the internet
updated in all client computer. working effectively. connection within the network
After successfully installing and configuring all the required services o the network, a testing process is
required to be implemented to ensure that all the services are working effectively.
1. AD DS Testing
AD DS Test Open the File Explorer and then right click Under the system properties the
on This Pc, then click on Properties from domain name ‘ISMT.edu.np’
the drop-down menu. should be seen.
Actual Result
2. DNS Testing
DNS Test Open the Run window on Server Operating Active Directory Users and
System and type ‘cmd’ and press enter. When Computers window should
the Command Prompt window opens type open up and domain should
“tracert www.ISMT.edu.np” and press enter. be shown in PC properties.
Actual Result
3. DHCP Testing
DHCP Test Open the Run windows and then type “cmd” If the DHCP has been
and press enter. When the Command Prompt enabled then there will be
opens type “ipconfig/all” and press enter again. Yes in the DHCP Enabled
Details.
Actual Result
4. IIS Testing
IIS Test Open the Internet Explorer and then type The linked html document should
the IP address or the domain name of open up on the Internet Explorer
“www.nicasia.com.np” as the website for nicasia.com.np.
Actual Result
Print Server Test Open the Run window and then type The installed printer should be
\\120.57.12.11/ and press Enter. shown.
Actual Result
VPN Server Test Open the Internet Access from the The system should be connected to
window taskbar and then connect to the VPN Connection and the
the VPN Connection by entering our domain name of the Internet Access
valid username and password. should be Nicasia.com.np
Actual Result
Future improvements that may be required to ensure the continued effectiveness of the networked
system.
So, far I’ve prepared a report on the concepts related to networking principles, topology, network devices
and their operating principles and proposed a topology that suite our scenario. Also, I have designed and
implemented the complete network of NIC Asia Branch Guaradha, Jhapa. I have installed and configure
different network servers and services to the Network in Windows Server 2012 R2. But, with technology
nothing is ever the same for long; there will always be changes and we need to keep up with them to stay
relevant and more productive. In essence, for a network to function optionally, all component software
and hardware involved in the network must be updated. When we have used same software and hardware
within the network for too long without making any significant changes to it, while our company task
increases exponentially every day, it will be very hard to complete the task as fast as they used to be.
Followings are the ways potential enhancements that are required for the effectiveness of the networked
system.
1. Provide a different network for Guests. Having too many users on a network can increases the
traffic flow and decrease the network performance. Hence, creating guests’ networks is very
important to limit the chances of having slow network.
2. Instead of using single Lenovo Think System ST550 Tower Server, multiple server can be used to
improve the speed of communication between devices and computer within the network.
3. We can also use more expensive and powerful server in our network, once we are financially
strong.
4. Develop necessary network monitoring tools to provide detailed insist and analysis on the cause
of network error and where they are located, thereby making network management easier and
faster.
5. We can also create the Virtual Local Area Network (VLANs) by splitting a physical network into
numerous logical networks to ensure effective communication of a group of devices located on
different LAN segments.
6. Once in a while, we can update and upgrades our network hardware and software deices like
cables, router, switches, Windows Server, Network Interface Card, etc.
We have designed and implement a very secure, flexible and efficient network for the branch office of
NIC Asia Bank at Gauradaha, Jhapa on the basis of the requirements of the bank. The network system is
a centralized network with a single router along with multiple switches to connect various networking
devices like workstation computers, servers, access point, printers and phone. Every computers, servers,
switches and routers are assigned with different IP addresses within the network. Similarly, based on the
requirements of the client’s different services are installed and configured. Some of the services are Active
Directory Domain Configuration(AD DS), Domain Name System(DNS), Dynamic Host Configuration
Protocol (DHCP), Virtual Private Network(VPN), Internet Information Services (IIS) and Print Server.
At first, the server is connected to the domain controller or DC that monitors the entire network
implementing security and authorization measures to all the components of the domain utilizing the AD
DS services. Similarly, the DHCP server is utilized to provide dynamic IP to different nodes within the
network, the DNS is utilized to assign hostname to IP address and the IIS helps in displaying the linked
html content of the website. While connecting the clients within a network, VPN creates a secured tunnel
and secures all the client’s data within the network. Likewise, a print server is utilized to connect printers
to client devices like workstation computer over a network.
Also, while exploring a range of available servers and choosing a suitable server based on the requirements
of the company, we have selected the cost and performance efficient server for NIC Asia bank’s Branch
Office. We decided to go with Lenovo Think System ST 550 Tower Server based on the financial budget.
For the network topology we have decided to go with Star Topology. Based on the security features and
network expansion option, star topology is the best topology for our network. Maintenance also plays a
very important role in the network, we have created a maintenance schedule for our system to resolve any
issue before they arrive or simply reduces the maintenance time. Similar to maintenance, testing is another
important aspect of network. We have tested the network system with different methods making sure that
there is no issue in the network. All the users within the network are assigned with their own user ID and
login hour so they can easily perform the required tasks within the system. Therefore, I would like to
conclude by saying that I have successfully fulfill my responsibilities and provide the company with an
effective networking system that meets all of their requirements.
References
Advantages and Disadvantages of OSI Model. (n.d.). Retrieved from rfwireless: https://www.rfwireless-
world.com/Terminology/Advantages-and-Disadvantages-of-OSI-model.html
Advantages and Disadvantages of the TCP/IP Model. (2018). Retrieved from tutorialspoint:
https://www.tutorialspoint.com/Advantages-and-Disadvantages-of-the-TCP-IP-Model
Explain the Advantages and Disadvantages of Centralized and Decentralized System. (n.d.). Retrieved
from study: https://study.com/academy/answer/explain-the-advantages-and-disadvantages-of-
centralized-and-decentralized-delivery-systems.html
How to set up a VPN Server on Windows Server 2012. (2012, November). Retrieved from You Tube:
https://www.youtube.com/watch?v=9qbpxKRb-94&t=235s
Internet Information Services (IIS). (2019). Retrieved from searchwindowsserver.techtarget:
https://searchwindowsserver.techtarget.com/definition/IIS
Print Server. (2021). Retrieved from serverwatch.com: https://www.serverwatch.com/guides/print-
server/
Setting up DNS on Server 2012 R2. (2014, June). Retrieved from You Tube:
https://www.youtube.com/watch?v=Ik1vM2C4-uE
VPN Server and How does it works. (2021). Retrieved from cactusvpn.com:
https://www.cactusvpn.com/beginners-guide-to-vpn/what-is-a-vpn-server-how-does-a-vpn-
server-work/
TCP/IP: What is TCP/IP Model & How Does it work. (2021). Retrieved from avg:
https://www.avg.com/en/signal/what-is-tcp-ip
What is a VPN Concentrator and How does it Work. (2021). Retrieved from privacyaffairs:
https://www.privacyaffairs.com/vpn-concentrator/
What is network topology and types of network topology. (2020). Retrieved from afteracademy.com:
https://afteracademy.com/blog/what-is-network-topology-and-types-of-network-topology