Networking - Assignment - Docx COURSE Hero

Download as pdf or txt
Download as pdf or txt
You are on page 1of 64

Networking

Sujan Gautam (HND / First Semester)


Networking 2018

Table of Contents
Task 1 [P1].............................................................................................................................................6

Introduction:...........................................................................................................................................6

Different types of Network:...................................................................................................................6

Network Standards:................................................................................................................................9

Conclusion:...........................................................................................................................................11

Task 2 [P2]...........................................................................................................................................12

Introduction:.........................................................................................................................................12

Types of Network Topologies:.............................................................................................................12

Conclusion:..........................................................................................................................................15

Task 4 [P3]...........................................................................................................................................16

Introduction:.........................................................................................................................................16

Networking Devices:............................................................................................................................16

Types of Server:...................................................................................................................................18

Conclusion:..........................................................................................................................................19

Task 5 [P4]...........................................................................................................................................20

Introduction:.........................................................................................................................................20

Hardware Requirements:......................................................................................................................20

Software Requirements:.......................................................................................................................21

Interdependency of hardware with software:.......................................................................................22

Conclusion:..........................................................................................................................................22

Task 8 [P5]...........................................................................................................................................23

Introduction:.........................................................................................................................................23

Design of the Networked System:........................................................................................................24

Use of IP in Different Server Technology:...........................................................................................25

Explanation of Server Technology:......................................................................................................25

Explanation of Network devices:.........................................................................................................27

Sujan Gautam (HND / First Semester)


2
Networking 2018

Explanation of Network Components:.................................................................................................27

Conclusion:..........................................................................................................................................28

Task 9 [P6]...........................................................................................................................................29

Introduction:.........................................................................................................................................29

Test Log:...............................................................................................................................................29

Evaluation of the design:......................................................................................................................30

Analyzing the user feedback:...............................................................................................................31

Conclusion:..........................................................................................................................................33

Task 13 [P8].........................................................................................................................................34

Introduction:.........................................................................................................................................34

Analyzing the Result:...........................................................................................................................34

Conclusion:..........................................................................................................................................39

Task 3 [M1]..........................................................................................................................................40

Introduction:.........................................................................................................................................40

Networking Principles of OSI layer:....................................................................................................40

Network Protocols:...............................................................................................................................42

Conclusion:..........................................................................................................................................44

Task 6 [M2]..........................................................................................................................................45

Introduction:.........................................................................................................................................45

Range of Server:...................................................................................................................................45

Selection of Server:..............................................................................................................................46

Characteristics of HPE ProLiant BL460 Gen10 Blade Server:........................................................46

Outlay of HPE ProLiant BL460 Gen10 Blade Server:.....................................................................47

Conclusion:..........................................................................................................................................47

Task 14 [M4]........................................................................................................................................48

Introduction:.........................................................................................................................................48

Old View of the Nepal Bank:...............................................................................................................48

Sujan Gautam (HND / First Semester)


3
Networking 2018

New View of the Nepal Bank:..............................................................................................................48

Potential enhancement of the Networked System:...............................................................................49

Recommendation:................................................................................................................................50

Conclusion:..........................................................................................................................................50

Task 7 [D1]...........................................................................................................................................52

Introduction:.........................................................................................................................................52

Basic Network Topologies:..................................................................................................................52

Selection of the Appropriate Topology:...............................................................................................53

Recommendation:................................................................................................................................54

Conclusion:..........................................................................................................................................54

Task 11 [D2].........................................................................................................................................55

Introduction:.........................................................................................................................................55

Maintenance Schedule:........................................................................................................................56

Conclusion:..........................................................................................................................................59

Task 15 [D3].........................................................................................................................................60

Introduction:.........................................................................................................................................60

Network Design:..................................................................................................................................60

Positive aspects of the Designed Network:..........................................................................................60

Negative Aspects of the Network Design:...........................................................................................61

Network Topology:..............................................................................................................................61

Diagnosis of the Implemented System:................................................................................................61

Recommendation for Improvements:...................................................................................................62

Conclusion:..........................................................................................................................................62

Bibliography.........................................................................................................................................63

Sujan Gautam (HND / First Semester)


4
Networking 2018

Task 1 [P1]
Discuss the benefits and constraints of different network types and standards.

Introduction:
Network can be defined as the group of computers or devices connected in order to share data and
information. There are various types of network and each has their own importance and provides
different services. ‘The network standards are the documents that contain technical and physical
specifications about the network being designed.’[ CITATION Des11 \l 1033 ] The reliability and
efficiency of the network can be seen by the certain standards. It can also be said that it is very much
essential for the standards to keep in order for the network to function properly.

In this task, I have provided and discussed about the various network system types such as peer-
based, client-server, cloud, centralized, cluster, virtualized including the different types of network
standards such as OSI model and TCP/IP model.

Different types of Network:


Different types of network have their own importance and provide various services. Some of the
network system types are mentioned below in short:

 Peer to Peer Network:


‘A peer-to-peer network is group of computers, each of which acts as a node for sharing files
within the group. Instead of having a central server to act as a shared drive, each computer
acts as the server for the files stored upon it.’[ CITATION Tec182 \l 1033 ] Peer-to-Peer
network can be termed as the decentralized communication model which allows every node
to operate as client and server; there are no any fixed clients and server.
Benefits: There are some of the good benefits of using peer to peer network. The networked
system will be very much reliable as the failure of one peer doesn’t affect the functioning of
the other peers. The cost of installation and maintenance is also relatively cheaper than the
client server network model. Simplicity is one of the features as there is no need of any
professionals to maintain this type of network.
Constraints: There are some of the constraints as well. The peer-to-peer network model is
decentralized in nature due to which it is complex and becomes difficult for single user to
administer the network. It is very much difficult to recover the data, as each user should have
its own endorsements.

 Client-Server Network:
Sujan Gautam (HND / First Semester)
5
Networking 2018

‘The term client-server refers to a popular model for computer networking that utilizes both
client hardware devices and servers, each with specific functions.’[ CITATION Bra181 \l
1033 ] Client-Server is the network architecture where the powerful one is server and the
client relies upon server for the data operation.
Benefits: There are some of the good benefits of client-server network. In client- server we
don’t find the central user and the overall system is centralized .i.e. operated by the server.
The data backup and recovery, which is very much difficult in peer to peer, is possible and
easier in client-server model. The server authorizes everything .i.e. everything is governed by
server and has various roles to play for the client.
Constraints: With some benefits, there are constraints as well. In comparison to peer-to-peer,
it is difficult to maintain client server and requires specialists and professionals for
maintenance. The maintenance and installation cost is very high of client server network.

 Cloud:
‘Cloud networking (and Cloud based networking) is a term describing the access of
networking resources from a centralized third-party provider using Wide Area Networking
(WAN) or Internet-based access technologies.’[ CITATION SDX12 \l 1033 ] Simply we can
say that it provides us the opportunity to store the files and information in the internet and
access it by our own choice.
Benefits: We can have various benefits by being in a cloud based networking. The data
backup and recovery is easier and possible. It is very much easier to maintain and upgrade
this network and the cost is also affordable. There is unlimited storage which makes the
storing very much easy.
Constraints: With benefits, there are some of the constraints as well of using cloud
networking. Hacking being the main problem as there is privacy and security issues. The
information or resources is entrusted upon the third-party. The users of cloud have very less
or limited access or control to the resources and information. There is a possibility of having
technical issues as well because it requires connection of the internet.

 Cluster:
‘In a computer system, a cluster is a group of servers and other resources that act like a single
system and enable high availability and, in some cases, load balancing and parallel
processing.’[ CITATION Tec061 \l 1033 ] Therefore, clustering is the process where two

Sujan Gautam (HND / First Semester)


6
Networking 2018

computers are linked together to form a single computer and is very useful as it works as a
redundant solution.
Benefits: We can get various benefits by being in a cluster network. The main feature is
scalability as we can add other features and resources to the cluster. The cluster network is
very efficient and designed usually for high availability solution. The information sharing is
also very fast in cluster network.
Constraints: With benefits, there are some constraints as well of cluster network. The
installation and maintenance cost is very much high as it requires many hardware and servers
to manage leading to high cost. The cluster network is not much flexible due to which many
of the applications are not supported.

 Centralized Network:
‘A type of network where all users connect to a central server, which is the acting agent for
all communications is called centralized network. This server would store both the
communications and the user account information.’[ CITATION Van18 \l 1033 ] Simply, it
means that everything is in charge of the provider or everything is in control of central
administrator.
Benefits: We can have various benefits in a centralized network. There is the presence and
role of central administrator due to which all, the responsibilities are clearly stated and well
governed. The decision-making is understandable with clear point.
Constraints: With benefits, there are some of the constraints as well of centralized network.
As the central administrator governs all the activities so failure of main server has the vital
affect to the entire network. Due to centralized nature, there is limited and low diversity,
which inhibits users from getting the required information.

 Virtualized Network:
‘Network virtualization (NV) is defined by the ability to create logical, virtual networks that
are decoupled from the underlying network hardware to ensure the network can better
integrate with and support increasingly virtual environments.’[ CITATION SDX12 \l 1033 ]
There is basically the feature of remote access due to the problem solving is easier and one
computer problem can be solved by another one by remote service.
Benefits: We can have various benefits in a virtualized network. In this network, one
computer administrator can take command of the other computer, which is beneficial. It

Sujan Gautam (HND / First Semester)


7
Networking 2018

provides a feature to share, access files and resources from one computer to another by
remote access.
Constraints: With benefits, there are some constraints as well. There is the lack of better
performance due to the slow internet connection. It has security and privacy issues as there is
no security features in many of the virtual system.

Network Standards:
‘Networking standards ensure the interoperability of networking technologies by defining the rules
of communication among networked devices.’[ CITATION Web16 \l 1033 ] We can say that there
are two conceptual model which are TCP/IP and OSI model also known as network standards and
they illustrate how networks should work for the proper functioning of network protocols. TCP/IP
and OSI layer has been discussed below:

 TCP/IP model:
It is one of the most important models based on the thought of stack of independent protocol.
It is known as Transmission Control Protocol and Internet Protocol having four important
layers. TCP/IP model is not much of use but the protocols have much significance and are
very much in use. The four layers are discussed below and each has their own significance
and importance in their own respective terms.
1. The Internet Layer
2. The Transport Layer
3. The Application Layer
4. The Host-to-Network Layer

Benefits: It is used in the internet architecture. The main work of internet layer is to permit
hosts to inject packets into any network and have they travel independently to the destination
(potentially on a different network).[ CITATION And03 \l 1033 ] Every layer likewise has
their own work and benefits. It is based upon the client/server model. Another important
merit is scalability in nature and can be operated independently. Due to internet layer, the
connection between the two computers is set up supporting excessive number of routing
protocols.

Constraints: The protocols are widely used rather than the model. The protocols being much
used is difficult to replace. The problem of model fitting the protocol is that any protocol
stacks is able to fit the model. The concepts, which are central to the OSI layer like services,

Sujan Gautam (HND / First Semester)


8
Networking 2018

interfaces and protocols, are not distinct in TCP/IP model. Another constraint is that it cannot
be used in various other applications.

 OSI model:
It is called as Open System Interconnection as it is open for the communication with other
systems. ‘OSI model itself is not network architecture because it does not specify the exact
services and protocols to be used in each layer.’[ CITATION And03 \l 1033 ] There are
various layers in OSI model, each model has its own work and OSI model just says what each
layer must do. The layers present are discussed below:
1. The Physical Layer
2. The Data Link Layer
3. The Network Layer
4. The Transport Layer
5. The Session Layer
6. The Presentation Layer
7. The Application Layer

Benefits: As I have described above that TCP/IP has not separated services, interfaces and
protocols which has been clearly distinct by OSI model. The OSI layer is easy to understand
than TCP/IP and is clear-cut. Another benefit can be that the connectionless and connection
adjusted communication is supported by OSI model with the protocols being flexible to
adopt. We get many choices when we use OSI model and it has very much less privacy issue.

Constraints: There are as well some of the constraints of OSI model. ‘The OSI model is not
biased towards one particular set of protocols, a fact that made it quite general.’ [ CITATION
And03 \l 1033 ]The protocol is difficult to fit like adding of a new protocol; the layers don’t
work in similar pattern so, interdependence exists between the layers as it takes time for data
communication from the precursor.

 IEEE 802.x:
‘IEEE 802 is an Institute of Electrical and Electronics Engineers (IEEE) standard set that
covers the physical and data link layers of the OSI model.’[ CITATION Tec183 \l 1033 ]
There are basically six types of network standards developed IEEE i.e. 802.1 802.2 and so on.
IEEE 802.1 is mainly associated to network management and IEEE 802.2 is related to OSI
model. Generally IEEE 802 illustrates the features, services and protocols for network.

Sujan Gautam (HND / First Semester)


9
Networking 2018

Conclusion:
Thus, various types of network and the other network standards have their respective importance and
operation in their respective fields. TCP/IP and OSI model are the part of the reference or considered
as conceptual model for network standards. As we know that network architecture reflects the design
of the networked system, so, TCP/IP and OSI defines the obligations for communication among the
network device present in the architecture.

Sujan Gautam (HND / First Semester)


10
Networking 2018

Task 2 [P2]
Explain the impact of Network Topology, communication and bandwidth requirements.

Introduction:
A topology is basically the physical arrangement or layout of a network that determines how the
network's computers are connected. ‘A network topology describes the arrangement of computer
network. It defines how the workstation, or nodes, within the network are arranged and connected to
each other.’[ CITATION UKE13 \l 1033 ] So, it is the design of a network and how different nodes in
a network are associated to each other and how they correspond is determined by the network's
topology. The network topology illustrates the arrangement of computer network.

In this task, I have clarified about the various types of network topologies and including its impacts
and the speed of data transmission and the way the communication is made in each of the topologies.

Types of Network Topologies:


There are two types of network topologies: physical and logical. Physical topology emphasizes the
physical layout of the connected devices and nodes, while the logical topology focuses on the pattern
of data transfer between network nodes. Both physical and logical topologies can be categorized into
five basic models:

1) Bus Topology: This type of topology is not used much in recent times than it was used earlier.
It is a network type where all the nodes are connected to the
single cable which is the backbone and also known as Bus. It
is very easy and requires less capital to set up. ‘A terminator is
added at ends of the central cable, to prevent the bouncing of
signals. A barrel connector can be used to extend it.’ Fig. 1: Bus Topology
[ CITATION Pen10 \l 1033 ] Two terminators and a barrel
connector can be clearly seen in fig. 1 which is a simple figure of bus topology.

Impacts of Bus Topology:

Sujan Gautam (HND / First Semester)


11
Networking 2018

Here, all the nodes are connected to the same line. Some of the positive impacts of using this
topology are: It is very much easy to do cabling and easy to connect to the devices; the cost is
relatively cheap and used in small networks. There are some of the negative impacts also by
using this topology: As all the nodes are associated to the same source and they receive signal
from it, there is low security; the entire cable is dependent upon the central cable so if the
main cable gets affected then whole system gets affected. ‘The bus topology of supported
media co-axial cable of designation 10Base-5 has a bandwidth of 10 mbps of maximum
segment length 500m.’ [ CITATION Bre18 \l 1033 ] In bus topology, data transmission can be
done by only one device at any one time. When more devices are added to the bus, collision
will take place and it will affect the network, i.e. network will be slower.

2) Star Topology: It is the type of topology (Fig. 2) where all the nodes are connected to a central
device or element called hub or switch. ‘In the star topology, one
central node or server workstation to which each of the other
nodes on a network are directly connected.’[ CITATION
UKE13 \l 1033 ] The central device or hub works as a junction
to connect all the nodes in the star network and UTP Ethernet
cable is used to connect to the central node. Fig. 2: Star Topology

Impacts of Star Topology:


It is the most preferred model among all the topologies. Some of the positive impacts of using
this topology are: The performance is far much better and the signals don’t get necessarily
transmitted; the set-up and trouble shoot is easy. There are some negative impacts as well: All
the nodes are dependent upon the hub .i.e. if the hub fails then all the system collapses; the
cost of cabling is also high. ‘The star topology of supported media category 5 of designation
1000Base-T has a bandwidth of 1 Gbps of maximum segment length 100m.’[ CITATION
Bre18 \l 1033 ] In star topology the transmission of data is very fast because each node has
its own cable which it doesn’t have to share. The data transmission rate and communication
depends on the central hub or switch.

3) Ring Topology: ‘It is the type of topology where all the nodes are connected to each-other in
such a way that they make a closed loop. Sending and receiving
of data takes place by the help of TOKEN.’[ CITATION Pen10 \l
1033 ] It can also be said that, it the topology where one node is
connected to only two neighbors. The node with token is

Sujan Gautam (HND / First Semester) Fig. 3: Ring Topology


12
Networking 2018

responsible to send data, while other nodes have to wait for empty token to reach them. Ring
topology is understandable by fig. 3 given there.

Impacts of Ring Topology:


It is organized form of network topology. Some of the positive impacts of ring topology are:
The load in the network doesn’t affect the working performance in this topology; all the
devices have equal importance as they have equal access to the resources. There are some
negative impacts also: Failure of one node can affect the entire network; Trouble shooting is
difficult and addition of node affects the entire network. ‘The ring topology of media UTP
has a bandwidth of 4-16 Mbps’[ CITATION Bre18 \l 1033 ]. The data transmission takes
places in clockwise unidirectional. So, very high transmission speed is possible.

4) Tree Topology: Tree Topology incorporates the features of both Star and Bus Topology as the
star networks is connected using bus. ‘In this type of topology
one root node is connected to all other nodes forming a hierarchy
and also called hierarchal topology.’[ CITATION Stu18 \l 1033 ]
That is, a node is connected to other sub level-nodes making an
order. Fig. 4 is a basic diagram of Tree topology which is
Fig. 4: Tree Topology
clearly understandable.

Impacts of Tree Topology:


It is a combination of star and bus topology. Some of the positive impacts of tree topology:
Addition of nodes and troubleshooting is very easy; other devices don’t get affected even if
one of them gets affected; it is supported by various hardware and software venders. There
are some negative impacts as well: if the central cable or hub breaks, then the system
collapses; maintenance and cabling is very much difficult when various nodes are added.

5) Mesh Topology: ‘In a mesh topology, each of the network node, computer and other devices,
are interconnected with one another. Every node not only sends its own signals but also relays
data from other nodes.’[ CITATION Pen10 \l 1033 ] In fact, in this type of
topology, each node is connected to all other nodes to form a complete mesh
like structure. It is very much expensive to manage this type of topology
and it is not much used. Fig. 5 is a basic diagram of Tree topology
Fig. 5: Mesh Topology
which is clearly understandable.

Sujan Gautam (HND / First Semester)


13
Networking 2018

Impacts of Mesh Topology:


Here, all the network nodes are linked to each other. Some of the positive impacts of mesh
topology are: There is no any traffic problem because of dedicated links; it is robust, due to
which even if one node fails, the whole network is not collapsed; there is data privacy and
security. There are some negative impacts as well: As all the nodes should be associated to,
each other, which make the configuration and connection, part difficult; the cost of cabling is
high. The mesh topology uses flooding and routing technique for the transmission of data due
to which it becomes faster.

Conclusion:
Network topology is the layout of a network and without the knowledge and better understanding of
various types of topologies; efficient network can never be built. As all the topologies have their own
advantages and disadvantages so we have to choose wisely the efficient one that suits the
requirement effectively. In today’s world, we all want our information sent and received quickly and
it can be all due to network topologies and devices so having the knowledge of network topology is
very much vital.

Sujan Gautam (HND / First Semester)


14
Networking 2018

Task 4 [P3]
Discuss the operating principles of networking devices and server types.

Introduction:
Networking devices have a very much vital role to play in the context of computer networks. There
are different networking devices till date and every networking device have their own importance
and functions to play. Mainly networking devices are connected to the computer for sharing files and
information. Various networking devices at different segments have their own work to perform. Any
device that operates server software or programs could be considered a server. Server accepts and
responds to the requests made by the client.

In this task, I have clearly mentioned and illustrated about the operating principles of different
networking devices and servers which are important factor in computer networks.

Networking Devices:
‘Different networking devices have different roles to play in a computer network. These network
devices also work at different segments of a computer network performing different
works.’[ CITATION FOS16 \l 1033 ] Mainly networking devices are connected to the computer for
sharing files and information and various networking devices at different segments have their own
work to perform. Some of the networking devices with their operating principle are mentioned
below:

1. Hub:
‘Network Hub is a networking device which is used to connect multiple network hosts. A
network hub is also used to do data transfer.’ [ CITATION
FOS16 \l 1033 ] Hub (Fig.1) is among the different
networking devices and it connects different networking
devices physically together as it functions as a physical layer.

Operating principle: Fig.1 Hub


As in computer networks the data are transmitted in the form of packets, so, when a hub
receives data packets, it copies all the information to the devices which are connected to it. In
this way all the devices connected to the port receive the data packets or resources. Hence, it
is the working mechanism of a hub and due to this working mechanism, it has security
concerns and slow data transfer rate.

Sujan Gautam (HND / First Semester)


15
Networking 2018

2. Router:
Router (Fig.2) is simply the networking device which has the function or work to forward
data packets or the information from one network to another
performing the traffic directing or reducing action.
Operating principle:
When the data packets are received by the router, it works to
Fig. 2 Router
determine the address location to forward and after finding the location
it searches in the routing table to get know how to reach the destination and forwards the data
packets or information.
3. Switch:
‘A network switch is a small hardware device that centralizes communications among
multiple connected devices in one local area network (LAN).’[ CITATION Bra18 \l 1033 ] A
switch (Fig. 3) can be used to connect individual computers or
different devices to bring together in a network for sharing files

Operating principle:
The working principle of the switch is that it inspects the Fig. 3 Switch
incoming packets and resources and transfers the data packets and
information to the only devices which are connected to the destination.
4. Firewall:
Firewall (Fig. 4) can be termed or defined as the windows or network security system that
inhibits the foreign access to the private networks. It also
functions as traffic directing or barrier for the errors
reaching to the files.

Operating Principle: Fig. 4 Firewall


Firewall is very much necessary in the computer as it has several techniques to maintain
privacy and security such as packet filter, application gateway and proxy level and prevents
from foreign access to the device.
5. Repeater:
Repeater is basically used for amplifying signals. It is a networking device which receives the
signals and transmits in the longer distances.
Operating Principle:

Sujan Gautam (HND / First Semester)


16
Networking 2018

The main principle of the working of the repeater (Fig. 5) is that it receives the signals or
frequency and transmits it to the longer distance. It operates similar as that of the satellites.
6. Bridge: Fig. 5 Repeater
Bridge (Fig. 6) is a networking device that builds a layer for the connection
between the two networks using the same protocol.

Operating Principle:
Fig. 6 Bridge
It operates as a data link layer and connects different networks together
in order to form the communication between them.
7. Access Point:
Access Point is a networking device that acts as a station for data
receiving and transmission and also provides the opportunity for
Wi-Fi devices to connect to a wired network.

Fig. 7 Access Point


Operating Principle:
‘An access point connects users to other users within the network and also can serve as the
point of interconnection between the WLAN and a fixed wire network.’[ CITATION Mar06 \l
1033 ] Access point has the feature to serve multiple users in a certain area and beyond that
area; they are handed to other one.

Types of Server:
Server can be considered a device, which has the ability to operate the server programs and
applications. Various servers were used in networked system of Nepal Bank Limited. Some of the
server types are:

 Web Server:
‘A Web server is a program that uses HTTP (Hypertext Transfer Protocol) to serve the files
that form Web pages to users, in response to their requests, which are forwarded by their
computers' HTTP clients.’[ CITATION Mar15 \l 1033 ] Web server is basically used for
developing the web pages and websites. It is very much helpful as the main feature of the
web server is to display or read the content of the websites.
 File Server:
‘A file server is a server that contains files which are made accessible to other clients on the
network. A file server has the sole responsibility for storing and managing a set of files,
which are made accessible to other computers.’[ CITATION Stu181 \l 1033 ] We can say that
Sujan Gautam (HND / First Semester)
17
Networking 2018

file server is an important server in networking because it makes the files accessible to the
clients on the same network. The files that are shared to the clients and file server can be any
device, which holds the permissions for the files and forwards them.
 Database Server:
‘Database server is the term used to refer to the back-end system of a database application
using client/server architecture.’[ CITATION Van18 \l 1033 ] It basically operates on the
network based application and functions to store and manage the databases. It also features to
grant access to the approved users only and mainly used for storing, manipulating and
analyzing of the data.
 Virtualization:
‘Virtualization is defined by the ability to create logical, virtual networks that are decoupled
from the underlying network hardware to ensure the network can better integrate with and
support increasingly virtual environments.’[ CITATION SDX12 \l 1033 ] There is basically
the feature of remote access due to the problem solving is easier and one computer problem
can be solved by another one by remote service. There are some of the benefits as well. One
computer administrator can take command of the other computer and by remote access we
can share access to various files and resources.
 Print Server:
A printer server is the server role which gives the member client the feature to get access the
printer from the servers which are in network. It allows the user host to get the printer from
the server where printer is installed and the member can print.

Conclusion:
Network devices and various servers with their proper management are very much essential for the
networked system. I have clearly described about all the networking devices with their operating
principles and various server types. Proper connection of the network device with their proper use
can be very much beneficial for the system.

Task 5 [P4]
Discuss the interdependence of workstation hardware with relevant networking software.

Introduction:

Sujan Gautam (HND / First Semester)


18
Networking 2018

‘Network infrastructure is the hardware and software resources of an entire network that enable
network connectivity, communication, operations and management of an enterprise
network.’[ CITATION Tec182 \l 1033 ] Network infrastructure is very much essential in the field of
networking. It comprises of hardware and software components. Hardware and software components
are essential parts in the computer networks. Hardware is the physical aspects whereas software is
the components because of which the computer or device functions.

In this task, I have discussed about different computer hardware that are needed to be installed in the
server and illustrated about the interdependence of the workstation hardware with networking
software.

Hardware Requirements:
Hardware is very much essential part in forming the network and the hardware should also be of the
best quality. Some of the hardware requirements needed to be installed in server are:

 For Server:

Components Requirements

1. Processor Intel core i5- 64 bit 8305GHz

2. Memory 8 GB RAM

3. Hard Disk 1 TB

4. Motherboard Intel SE7501BR2

5. Optical Drive DVD RW

6. Printers Ink jet

7. Chipset Intel E7500

8. Monitor 19 LCD/LED

9. Network Adapter Ethernet 100/1000

10. Firewall Juniper

11. Switch Ethernet/ Managed with unmanaged

12. Routers Smart wireless / ASUS RT-AC88U

Sujan Gautam (HND / First Semester)


19
Networking 2018

 For Client:

Components Requirements

1. Processor Intel i3/i5

2. Memory 4-8 GB

3. Hard disk 1 TB

4. Switches Ethernet

5. Monitor LCD/LED

Software Requirements:
‘Network software is an extremely broad term for a range of software aimed at the design and
implementation of modern networks. Various types of network software support the creation,
calibration and operation of networks.’[ CITATION Tec182 \l 1033 ] Software is another important
part as like hardware for the formation of the networked system. It is from what the overall system
operates and the network software is the basic element for any network. It helps the administrator
administer or look after or manage the network. The internet, which is the worldwide connection, is
relying upon networking software. The networked system of Nepal Bank Limited requires various
kinds of software like MY SQL, which is the database software, Google chrome as the web browser,
different Microsoft package software, financial software etc., are also much essential necessary for
the networked system.

The clients of the Nepal Bank Limited are using Windows 10 as their Operating System which
simply supports all the basic software like Microsoft Office, Banking and financially required
software, etc. The server computer use Windows Server 2016 as the Operating System where a
domain controller is configured and it administers all the clients in the network. There were different
firewalls software in both the server and the client in a network for the protection from threats.

Software Server Client


Operating System Windows Server 2016 Windows 10
Server Software Servers like Web server, File server and -
Print server, Virtualization, Database
server
Client Software and Configured knowing the requirements Basic software like Microsoft
Sujan Gautam (HND / First Semester)
20
Networking 2018

application Office, Banking and financially


required software, etc.

Interdependency of hardware with software:


Hardware and Software are interdependence. Their coordination among each other is very much
necessary and essential. Once use is not counted without the equal use of other .i.e. together is what
they operate very well. Network failure and disruption is very much common without the proper
coordination between them. Software performs a specific task by giving an ordered set of
programmatic instructions to hardware. Hardware serves as the delivery system for software
solutions. Hardware cannot function until software is loaded and software is installed in hardware to
set the programs in action. These two components are complementary and cannot act independently
of one another. It is very much essential for both to function well in their respective cases for the
networked system to run in an efficient and smooth manner. Both the hardware and software must be
of good quality for the better productivity in the system. The client and server operating system .i.e.
Windows 10 and Windows Server 2016 can effectively work with the hardware requirements
depicted earlier in the table. Hence, we can say that workstation hardware and the networking
software are dependent upon each other.

Conclusion:
In summary, for the flawless running of the networked system, it is very much essential to have the
required hardware for the software and the relevant networking software. The proper functioning of
the system is all due to the proper synchronization between the hardware and software. Both the
hardware and software must be of good quality for the better productivity in the system. So, the
earlier depicted hardware requirements and the networking software must be established in the head
and the branch office to form an effective networked system.

Task 8 [P5]
Design a networked system to meet a given specification.

Introduction:
‘A network is a collection of computers, servers, mainframes, network devices, peripherals, or other
devices connected to one another to allow the sharing of data. An excellent example of a network is
the Internet, which connects millions of people all over the world.’[ CITATION Com17 \l 1033 ] We
can simply say that a network is where all the devices or computers or technologies are linked
together in order to communicate. Design is basically a model. Designing a network is needed before

Sujan Gautam (HND / First Semester)


21
Networking 2018

the implementation of network infrastructures. Network design is a plan for the execution of
computer network infrastructures and basically a blueprint for executing network physically.

In my task, I have created or designed a networked system to meet a given specification considering
server technology, network components and network devices.

Design of the Networked System:

Sujan Gautam (HND / First Semester)


22
Networking 2018

Use of IP in Different Server Technology:


Server IP address Subnet Mask Gateway DNS

Domain Controller(DC) 192.168.1.2/28 255.255.255.240 _ 192.168.1.2

Domain Name 192.168.1.3 255.255.255.240 192.168.1.1 192.168.1.2


System(DNS)

Dynamic Host 192.168.1.4 255.255.255.240 192.168.1.1 _


Configuration
Protocol(DHCP)

Routing and Remote 192.168.1.5 255.255.255.240 192.168.1.1 192.168.1.2


Access Service (RRAS)

Windows Deployment 192.168.1.6 255.255.255.240 192.168.1.1 192.168.1.2


Services(WDS)

Read Only Domain 10.10.10.5 255.0.0.0 10.10.10.1 10.10.10.1


Controller(RODC)

Virtual Private 192.168.1.8 255.255.255.240 192.168.1.1 192.168.1.2


Network(VPN)

CDC 10.10.10.6 255.0.0.0 10.10.10.1 10.10.10.1

An IP address, or simply an IP, is a unique address that identifies a device on the Internet or a local
network. It allows a system to be recognized by other systems connected via the Internet protocol.
[ CITATION Tec16 \l 1033 ] IP address is numerical value given to all the devices, which are
connected to the network. Below, I have depicted IP addresses assigned to the servers during network
design:

Explanation of Server Technology:


‘In a technical sense, a server is an instance of a computer program that accepts and responds to
requests made by another program, known as a client’. [ CITATION Com18 \l 1033 ]Typically, any
device that operates server software or programs could be considered a server as well. The
description of the server technologies above mention are as follows:

 Domain Controller (DC): ‘A domain controller (DC) is a server that handles all the security
requests from other computers and servers within the Windows Server domain. Security
requests include requests to log in to another server.’[ CITATION Com18 \l 1033 ]

Sujan Gautam (HND / First Semester)


23
Networking 2018

Moreover, we can say that domain controller is the main server computer, which controls all
the activities within the domain like security authentications etc.
 Domain Name System (DNS):
‘Domain name system (DNS) is a hierarchical naming system built on a distributed database.
This system transforms domain names to IP addresses and makes it possible to assign domain
names to groups of Internet resources and users, regardless of the entities' physical location.’[
CITATION Tec18 \l 1033 ] DNS can be considered as Internet phone book as it transforms
hostnames to IP because of which it is easier to assign and give the domain names.
 Dynamic Host Configuration Protocol (DHCP):
DHCP is a network control protocol that automatically offers an IP host with its IP address
and other different configuration information together with the subnet masks and default
gateway. DHCP allows both manual IP address assignment and automatic assignment.
 Windows Deployment Service (WDS):
It is a server technology which provides the administrators the ability or facilities to deploy
windows OS remotely.
 Read Only Domain Controller (RODC):
A read-only domain controller (RODC) is a server that hosts an Active Directory database's
read-only partitions and responds to security authentication requests.[ CITATION Mar16 \l
1033 ] RODC provides a definition by its name which is it has a read only copy of database
of active directory and it also enhances and provides the security for DC.
 Virtual Private Network(VPN):
‘A virtual private network (VPN) is a technology that creates a safe and encrypted connection
over a less secure network, such as the internet.’[ CITATION Tec181 \l 1033 ] VPN is mainly
used in order to allow the remote users to access the resources as the data travels through
tunnel safely.
 Secondary DNS:
Secondary DNS can be basically termed as the backup in case the down nature of primary
DNS and it can be used to balance even if the DNS is down, sever would be up and exchange
of information is possible.

Explanation of Network devices:


Network devices mainly include router, switch, printer, access point and firewall. They are the basic
and fundamental networking devices.

 Router:
Sujan Gautam (HND / First Semester)
24
Networking 2018

Router is simply the networking device, which has the function or work to forward data
packets or the information from one network to another performing the traffic directing or
reducing action.
 Switch:
‘A network switch is a small hardware device that centralizes communications among
multiple connected devices in one local area network (LAN).’[ CITATION Bra18 \l 1033 ] A
switch can be used to connect individual computers or different devices to bring together in a
network for sharing files
 Printer:
A printer is an external networking device or the output devices, which functions to print the
data or information in hardcopy. It is very useful device.
 Access Point:
Access Point is a networking device that acts as a station for data receiving and transmission
and also provides the opportunity for Wi-Fi devices to connect to a wired network.
 Firewall:
Firewall can be termed or defined as the windows or network security system that inhibits the
foreign access to the private networks. It also functions as traffic directing or barrier for the
errors reaching to the files.

Explanation of Network Components:


The basic network components are users, groups, organizational unit, membership and group policy
which are explained in short:

 Users:
A user is a person or individual that uses or operates computer or network service by not
needing of technical expertise.
 Groups;
A group can be known as grouping of users or the user accounts that usually share the same
security rights as well as the permissions. Access control is the main use of group.
 Organizational Units:
Organizational unit can be termed as container or the subdivision within a Active directory
which can hold or we can keep users, groups and other OU’s also.
 Membership:

Sujan Gautam (HND / First Semester)


25
Networking 2018

Membership can be considered as the main or the most important factor because it is
responsible for accessing files, folders and other data’s as without the membership of the
domain we can’t get access to the environment of Active directory.
 Group Policy:
Group Policy can be termed as hierarchical feature that controls the working environment or
configuration part for user accounts or computers.

Conclusion:
Here, I have designed a networked system and also described the network components and sever
technology included in designing. The design works as a blueprint or it shows how network is
established. As network design is necessary before implementation of network infrastructure, the
design above clearly depicts the connection of network components and devices to form an overall
network of a bank.

Sujan Gautam (HND / First Semester)


26
Networking 2018

Task 9 [P6]
Test and evaluate the design to meet the requirements and analyze user feedback.

Introduction:
Testing is the process of analyzing the report and getting known about the flaws. It has very much
significance for getting across about the problems. After all the work or assignment has been
completed then we look for the testing to analyze the result. Testing is of various types and is the
verification or judgment of the work. While testing we evaluate the result, so the evaluation and
analyzing comes under test operation.

In this task, I firstly prepared the test log of the proposed design considering the expected and the
actual output. I have also collected the user feedback for my design and carried out the analyzing
processes.

Test Log:
So, below I have given the test log, which is carried out for the effectiveness of the design of the
networked system.

S. What was tested? Expected Output Actual Output Remarks


N
1. DHCP Server IP address must be As there is the The client’s
scope range from 1 requirement with
dynamically assigned to all
to 110, so 100 the IP address
the clients clients can easily successfully met.
get the IP address.

2. Domain Work group is converted in Clients can be the Client requirements


Controller to domain based and member of the with the resources
responsible for allowing domain and log on successfully met.
host access to the Windows at any workstation
domain resources via account and
access the resources

3. Windows Operating system is Deployed OS Client without OS


Deployment installed in the client remotely from the boot from the
Services through images. server. network and get the
OS installed.

4. Print Server Member client should get Client which is Clients requirement
access to the shared printer member can with the print server

Sujan Gautam (HND / First Semester)


27
Networking 2018

successfully print successfully met


through the shared
printer
5. Web server The client should display IIS server was Client successfully
the web page by the help of configured which delivered and
hostnames. helped to display displayed the web
the web page in page.
local server through
hostnames.

Evaluation of the design:


The design of the network system has been properly done and test log has been carried out. Now, I
have evaluated the suitability of the design encountering the requirements of the clients. During
evaluation, the system performance is measured through the mechanism configured in the clients.
Thus, the design of the networked system fulfils the client requirements, the various reasons why the
networked system is suitable one are clearly defined, and the evaluation of the design was done
considering the following important factors:

 Reliability: The networked system must be reliable. ‘Administrators have to make sure that
at any given time the network is capable of delivering packets to their destinations in a timely
fashion with an acceptable delay and jitter profile.’ [ CITATION Wae08 \l 1033 ] In my
design, I have focused on how I can make my networked system very reliable. The common
problem in every networked system can be traffic. Therefore, keeping in mind about the
traffic I have made the network design, which will run smoothly. The design is made
according to the client’s requirement, so that the networked system will be reliable and
reduce the future problems.
 Scalability:
The networked system needs to add technology or devices in the near future for the better
productivity. Scalability means to provide a way to include or extend the system for the better
improvement. Every networked system should be capable to extend and make the system
more advanced. Knowing the importance of scalability, I have made the design, which is able
to adapt to growth, and business scalability needs without needing the system to make drastic
change.
 Bandwidth:
It is another factor to be considered for the efficient running of the networked system.
Networked system must be fast and bandwidth is the key aspect for determining speed.

Sujan Gautam (HND / First Semester)


28
Networking 2018

‘Bandwidth is the amount of data that passes through a network connection over time as
measured in bits per second (bps).’ [ CITATION Bra18 \l 1033 ] It depicts the overall or total
capacity of the connection of the system and higher the capacity, higher the performance of
the networked system. The networked system has enough bandwidth and the system will
operate or run faster and smoother.
 Security and Troubleshooting:
Security and Troubleshooting can be considered the factor for evaluating how efficient the
network system is and if it can give the proper advantages. In the design process, I had
thought about the hackers or the attackers, which can be a threat. So, the networked system is
designed in such a way that it would be as difficult for them to disturb. The troubleshooting is
also considered. It should be easy to detect and troubleshoot the flaws. Hence, security and
troubleshooting evaluates the networked system.

Analyzing the user feedback:


Independent Feedback
Project Title: Nepal Bank Networked System

Feedback Given By: Hari Adhikari Signature:

Date:

Project Description: The project is to plan, manage, design and implement the networked system for
the Nepal Bank Limited. As the branch to communicate, now because of the new design is using the
work group based network, the computer would be domain based where one server governs all other
clients and manages all other resources.
Important Features The main feature is that the networked system is domain based. Being
of the Project domain based, the centralization policy has been applied. All the clients are
connected to the domain and domain manages all the other resources
required for the client computers. The other important servers like DHCP,
RODC, CDC, Print, VPN, etc. has been inculcated which greatly enhance
the networked system. Strong firewalls has also been configured which
addresses the security issues.

Checklists YES NO Comment


The system fulfils all the requirements of the client.

The security system is well managed.

The growth of the network in near future is possible.

The front end and the back end of the system have been
designed.
Sujan Gautam (HND / First Semester)
29
Networking 2018

The problem of the clients has been addressed.

There is flexibility in the networked system.

Significance of the Project The main significance is domain based brought by the domain based
network. Being in this type of network, it is very much easier for the
client as well as the administrator. There is centralized user
management. One administrator looks after the domain its users and
resources. There is no need to make changes throughout the computer,
as the changes made in the one computer will change all others. The
server roles like RODC, CDC, VPN, Print, DHCP etc. have been
configured which brings many features and it makes easy for the
clients and the administrator. All these servers operate to make the
system reliable, effective and efficient.
Limitation of the Project We can get many significances from this networked system and yet
some of the limitations are in existence. There is no availability of
Secondary DNS. The system does not operate properly as it should
have due to improper separation of DNS server. The cloud computing
has to be established for securing as it enables data recovery and
backup.

Feedback Evaluation
Feedback Evaluated by: Sujan Gautam Signature:

Date:
Evaluation of the System:
According to the feedback, there are some good aspects and some of the limitations as well which
needs to be addressed as soon as possible. There is a lack of secondary DNS, which is needed
because it offers security through redundancy and it functions to moderate the resource load on
primary DNS. The cloud computing system must also be introduced to protect backup and recovery
data. There should also be the enhancement of the VPN server.

Recommendation for the future consideration:


When the networked system is upgraded from work group to domain based, it brings many features
with it and it makes the client and administrator easy to function. If we look after some of the flaws
and reduce it, then it would be the best for the Nepal Bank Limited and it would greatly increase the
productivity. The system can get much better in future as there is the opportunity of the scalability
and we can add extra features to the system. Looking after the security, reliable and scalable nature of
this networked system; it will run very smoothly and will be productive for the Nepal Bank Limited.

Conclusion:
In summary, the design was properly tested and evaluated in order to meet the client requirements.
While testing we evaluate the result, so the evaluation and analyzing comes under test operation.
Taking feedback proved to be very beneficial, as it led me to find the limitations of the design and

Sujan Gautam (HND / First Semester)


30
Networking 2018

work for its betterment. The feedbacks were properly analyzed and the recommendations for the
future consideration are given.

Task 13 [P8]
Document and analyze test results against expected result.

Introduction:
Testing is the process of analyzing the report and being known about the flaws. It has very much
significance for getting across about the problems. After all the work or assignment has been
completed then we look for the testing to analyze the result. Testing is of various types and is the
verification or judgment of the work.

In this task, I have provided a document and illustrated how I analyzed the actual test results against
the expected outcomes.

Analyzing the Result:


1. Network Connectivity Testing

SN Tested Date What was tested? Expected output Actual output

1 5/16/2018 Network connectivity was In cmd.exe, Reply Reply was given


tested should be there by the client
after ping which was
pinged

Sujan Gautam (HND / First Semester)


31
Networking 2018

Analysis:
There is given a reply from the client, which shows the proper network connection.
Therefore, it is the network connectivity testing.

2. Testing of the domain:

SN Tested Date What was Expected Actual Output


tested? Output
2 5/16/2018 Domain was There should NEPALBANKLIMIT
tested be domain ED was seen on the
name when the start of the server.
device reboots

Analysis:
There is an effective and clear result of the domain testing as domain name is seen at the start
of the system

Sujan Gautam (HND / First Semester)


32
Networking 2018

3. Membership testing:

SN Tested Date What was Expected Actual Output


tested? Output
3 5/16/2018 Domain There should be Sign in to
membership was the screen of NEPAL was
tested sign in to seen at the start
domain at the
start of the
computer

Analysis:
There is an effective, positive and clear result of the test of the membership as domain name
as sign in request is clearly observed.

4. Test of RODC

SN Tested Date What was Expected Actual Output


tested? Output
4 5/16/2018 RODC was The OU created Nepal bank OU
tested must be seen in was clearly seen
the another
server

Sujan Gautam (HND / First Semester)


33
Networking 2018

Analysis:
There is effective, positive and clear result of the RODC testing as OU created can be clearly
observed at the other server.

5. Testing of Child Domain Controller

SN Tested Date What was Expected Actual Output


tested? Output
5 5/16/2018 CDC was tested Child domain Nepal child
which is created domain was
must be seen seen before the
before main domain nibl.org
domain

Analysis:
There is effective, positive and clear result of the testing of CDC as child domain is observed
just before the main domain

Sujan Gautam (HND / First Semester)


34
Networking 2018

6. Print Server

SN Tested Date What was Expected Actual output


tested? output
6 5/16/2018 Print server was The client The client gets
tested. computer should access to the
have the printer.
facilities to get
the printer
automatically.

Analysis:
There is effective, positive and clear result of the testing of print server as the client gets
access to the printer.

7. VPN

SN Tested Date What was Expected Actual output


tested? output
7 5/16/2018 Testing of the There should be Reply from the
VPN the reply when pinged one when
there is there is
connection to the connection
private network

Sujan Gautam (HND / First Semester)


35
Networking 2018

Analysis:
There is effective, positive and clear result of the testing of VPN and now the user can get
access to the private network from the public network.

Conclusion:
The above document clearly shows the test, which was carried out. All those test shows positive
results, which clearly illustrate the establishment of the networked system without the flaws and
errors. The report shows the test date, test number, what was tested, Expected output and Actual
output which assures or ensures successful implementation or execution and diagnosis of the
networked system.

Sujan Gautam (HND / First Semester)


36
Networking 2018

Task 3 [M1]
Compare common networking principles and how protocols enable the effectiveness of
networked systems.

Introduction:
Network can be defined as the group of computers or devices connected in order to share the
information and networking principles are the format or pattern, which shows how various
networking devices communication is established in a network. ‘A protocol is a set of rules and
guidelines for communicating data. Networks have to follow these rules to successfully transmit
data.’ [ CITATION tec06 \l 1033 ] The protocols are very much needed for maintaining the
effectiveness of the networked system and it states the standards for data communication and
transmission providing enough information on the method involved.

In this task, I have discussed about the networking principles of OSI layer or model and provided a
document on how the different protocol enables the effectiveness of the networked system.

Networking Principles of OSI layer:


OSI layer is called as Open System Interconnection as it is open for the communication with other
systems. ‘OSI model itself is not network architecture because it does not specify the exact services
and protocols to be used in each layer.’[ CITATION And03 \l 1033 ] There are various layers in OSI
model, each model has its own work and OSI model just says what each layer must do. Some of the
principles were considered before actually making a layer like: ‘a layer should be created where a
different abstraction is needed; layer should perform independent function; the layer boundaries
should be chosen to minimize the information flow across the interfaces.’[ CITATION And03 \l 1033
] The seven layers of the OSI model with their operating principles or mechanisms are different from
each other and mentioned in brief:

Fig. 1 OSI LAYER

 The Physical Layer:

Sujan Gautam (HND / First Semester)


37
Networking 2018

‘The electrical and procedural parameters of the physical connection between the network
subscribers are defined in the physical layer.’ [ CITATION Spr14 \l 1033 ] It is basically
based on transmitting raw bits over the communication medium. Physical layers include
various devices like Ethernet, token-rings.
 The Data-Link Layer:
‘The main task of the data link layer is to transform a raw transmission facility into a line that
appears free of undetected transmission errors to the network layer.’[ CITATION And03 \l
1033 ] Data link layer being most complex so, it is divided into two parts which are Media
Access Control and Logical Link Control as sub layers. Media access control deals with the
issue of controlling access to the shared medium.
 The Network Layer:
It has the work to control the functioning of the subnet and routing is also the added features
in terms of network layer .i.e. it supports routing. This layer as well acts as a medium for the
data transmission between the nodes. In this layer, routing problem is simple in terms of
broadcasting so, layer is thin.
 The Transport Layer:
‘The function of this layer is to accept the data from above, split it up into smaller units if
need be, pass these to the network layer, and ensure that the pieces all arrive correctly at the
other end.’[ CITATION And03 \l 1033 ] The transport layer also functions to verify the flaws
in the data it receives. The common transport layer examples are User Datagram Protocol and
Transmission Control Protocol.
 The Session Layer:
Due to session layer, users who are in different machine have the opportunity to form
sessions among them. Session provides various services like keeping the records about whose
work it is to broadcast data, managing tokens, continuing the connection from where there is
interruption (synchronization) etc.
 The Presentation Layer:
‘It is concerned with the syntax and semantics of the information transmitted.’[ CITATION
And03 \l 1033 ] It is one of the simplest and as well in the function in terms of OSI layer. One
principle of presentation layer is that it manages the abstract data structures and translates the
data from one presentation layout to another.
 The Application Layer:

Sujan Gautam (HND / First Semester)


38
Networking 2018

‘The Application layer supplies network services to end-user applications. Network services
are typically protocols that work with user's data.’[ CITATION Bra182 \l 1033 ] This layer
mainly has protocols like HTTP (Hyper Text Transfer Protocol) as it is needed by the user.
Some other services like file transfer, electronic mail are also provided in this layer.

Network Protocols:
The protocols are very much needed for maintaining the effectiveness of the networked system.
Some of the protocols with its necessity are discussed below:

Fig. 2 Network Protocols

 TCP/IP:
TCP stands for Transmission Control Protocol and IP stands Internet Protocol. Both have
their respective functions. ‘TCP defines how applications can create channels of
communication across a network.’[ CITATION Mar17 \l 1033 ] It encapsulates the data in
the form of packets and sends it to the destination. TCP deals with the connection between
the two clients and exchange of information. It is the only reason for the internet’s existence.
IP stands for Internet Protocol and a process by which transmission of data takes place.
‘TCP/IP is highly scalable and, as a routable protocol, can determine the most efficient path
through the network.’[ CITATION Mar17 \l 1033 ] TCP/IP is a very important in terms of
internet and it is nonproprietary. Its significance cannot be underestimated and it’s very much
important for the establishment of the networked system.

 DHCP:

Sujan Gautam (HND / First Semester)


39
Networking 2018

DHCP is a network control protocol that automatically offers an IP host with its IP address
and other different configuration information together with the subnet masks and default
gateway. DHCP allows both manual IP address assignment and automatic assignment.
Without DHCP, IP addresses must be configured manually for new computers or computer
systems which might be moved from one subnet to some other, and manually reclaimed
for computer systems that are disconnected from the network. DHCP enables this entire
operation to be automatic and controlled centrally. Hence, DHCP is very much necessary for
the networked system.
 HTTP:
HTTP stands for Hyper Text Transfer Protocol. ‘HTTP is the underlying protocol used by
the World Wide Web and this protocol defines how messages are formatted and transmitted,
and what actions Web servers and browsers should take in response to various
commands.’[ CITATION Van182 \l 1033 ] It is simply used for accessing and creating the
web pages. The help of HTTP has developed every web page
 UDP:
UDP stands for User Datagram Protocol. It is connectionless and very much important in the
field of client-server part. Basically, it has a merit of sending the small data grams without
having the establishment of the connection.
 FTP:
FTP stands for File Transfer Protocol and the function is basically as by its name. It helps or
operates to transfer files from a client to server in a networked system. So, it is another
important protocol which is very much effective and needed for the networked system.
 SMTP:
SMTP stands for Simple Mail Transfer Protocol. Generally, we send emails and the emails
sent by the email system use SMTP, so, it is one of the factor for maintain the connections.
 DNS:
‘Domain name system (DNS) is a hierarchical naming system built on a distributed database.
This system transforms domain names to IP addresses and makes it possible to assign domain
names to groups of Internet resources and users, regardless of the entities' physical location.’[
CITATION Tec18 \l 1033 ] DNS can be considered as Internet phone book as it transforms
hostnames to IP because of which it is easier to assign and give the domain names as a result
it is another factor for establishing networked system.

Conclusion:

Sujan Gautam (HND / First Semester)


40
Networking 2018

In summary, we can say that the various layers of OSI have their own respective importance and
each has their own operating principles and greatly helps in the establishment of the network.
Though the networking principles of the layers present in OSI are different, all the layers play their
significant role for forming the network system. The network protocols are also of many types and
they are essential part as it enables the effectiveness of the networked system in many ways.

Sujan Gautam (HND / First Semester)


41
Networking 2018

Task 6 [M2]
Explore a range of server types and justify the selection of a server, considering a given
scenario regarding cost and performance optimization.

Introduction:
‘In a technical sense, a server is an instance of a computer program that accepts and responds to
requests made by another program, known as a client’. [ CITATION Com18 \l 1033 ]Typically any
device that operates server software or programs could be considered a server as well. In a network,
the connection is all related to the client and the server. So, a server has a very important role to play
in a networked system. Firstly, a server must be selected to effectively form a networked system and
a server selection must meet all the requirements of the networked system of the company.

In this task, I firstly made an exploration of the servers and selected the appropriate server regarding
cost and performance optimization. A proper server selection will be very fruitful and will meet all
the objectives of the Nepal Bank Networked System.

Range of Server:
After a wide exploration, three types of server were found before selecting the appropriate one for
the networked system. They were:

1. Rack Server: It is a server hardware dedicated to use as a server and designed to be


configured or mounted in a structure called a rack. The rack server configuration also
simplifies cabling among network components. The basic rack server that I have explored is
Dell PowerEdge R420 Rack Server.
2. Tower Server: It is a server hardware that is constructed in an upright cabinet standing alone
and functions to operate as a server. The cabinet is known as tower and multiple tower
functions to operate various tasks and processes. The basic tower server that I have explored
is Dell PowerEdge T420 Tower Server.
3. Blade Server: ‘A blade server is a server chassis housing multiple thin, modular electronic
circuit boards, known as server blades’[ CITATION Mar11 \l 1033 ]. Blade servers are the
most latest and advanced one having many good features. The basic blade server that I have
explored is HPE ProLiant BL460 Gen10 Blade Server.

Selection of Server:

Sujan Gautam (HND / First Semester)


42
Networking 2018

All three servers above written have merits and demerits. Keeping in mind which server can be
effective, HPE ProLiant BL460 Gen10 Blade Server was selected for smooth performance of the
Nepal Bank. Selection was done considering cost, performance, and other various useful
characteristics.

Characteristics of HPE ProLiant BL460 Gen10 Blade Server:


‘A blade server is a server chassis housing multiple thin, modular electronic circuit boards, known
as server blades. Each blade is a server in its own right, often dedicated to a single
application.’[ CITATION Mar11 \l 1033 ] Blade server has many good features, which can be very
essential for the proper functioning and easy operating in the networked system of the Nepal Bank.
Blade servers are the most latest and advanced one having many characteristics. Some of the
characteristics of the blade server, which was selected, are discussed below:

 Accelerates Workloads with High Performance:


‘The HPE ProLiant BL460 Gen10 Server Blade with 16 GB HPE Persistent Memory 3,
optimized on HPE ProLiant, delivers unprecedented levels of performance and data resiliency
for databases and analytic workloads.’[ CITATION Hew18 \l 1033 ] Having dense blade
design, it accelerates the workloads and increases performance. Another feature is the option
of flexible internal flash storage and most up-to-date Intel processors. The processor speed is
3.6 GHz due to which it boosts high performance computing capabilities and accelerates
application and we can do more in limited time.
 Scalability and Deployment:
It is one of the important features, which made it the best one to be selected for the networked
system of the Nepal Bank Limited. Different materials should be included and removed in the
networked system as the time passes. When there is need to increase applications, HPE
ProLiant BL460 has the latest Intel Processor with up to 26 cores, internal 12 GB SAS and 2
TB of HPE DDR4 Smart memory, with possibilities of greater aptitudes in the future. It is
very much easier to add or swap a new server, which is known as scalability, which is very
much difficult in rack servers.
 Cabling and Manageability:
It is very much easy in cabling and managing. The server has dedicated switch slots due to
which there is no needed much number of cables for the servers. Being the smallest, it is very
much easier to set up. In other server there is the possibility of failure and problem with load
balancing which when using this server will be very much easier to manage. Other failures

Sujan Gautam (HND / First Semester)


43
Networking 2018

like hardware, it makes possible to identify and solve. Thinner look and infrastructure of this
server makes the work effortless.
 Density and Utility Savings:
‘One can fit a greater number of servers per rack than traditional rack servers, so you save on
space.’[ CITATION Col18 \l 1033 ] It means it has high density, a higher number of servers
can be adjusted, and they save the space. When this server is used in the networked system,
then it uses less power and hence improves power management. It takes relatively less space,
power per storage unit.

Outlay of HPE ProLiant BL460 Gen10 Blade Server:


The cost of the server with the other devices required for the effectiveness of the networked system is
depicted below:

SN Devices Price
.
1. Server RS. 1,68,000
2. Switch 10/150 RS. 14,000
3. Router (manageable) RS. 13,00

4. Cables RS. 12,000


5. Wireless access point RS. 16000

Conclusion:
Consequently, server is the first and foremost need in order to be in network or to establish a
networked system. It was very much essential to select an appropriate one for the Nepal Bank
Networked System, so, HPE ProLiant BL460 Gen10 Blade Server was considered the appropriate
one as its features meets all the requirements of the system. Hence, for the productive and efficient
running of the system, appropriate server is the basic keystone for any company.

Sujan Gautam (HND / First Semester)


44
Networking 2018

Task 14 [M4]
Recommend potential enhancement of the networked systems.

Introduction:
Basically, a networked system provides or gives the information about all the network components,
devices and how they are connected to each other for sharing of information. It is quite necessary or
important to properly maintain and govern the system for the efficient running of the system. The
networked system was designed addressing all the problems and meeting the client requirements. As
the Nepal Bank needs a high quality networked system, domain based network is of vital importance.
The high quality network components and devices are set up which in present and in the near future
helps in smooth, efficient and effective running of the networked system.

In this task, I have given description about the enhancement in network hardware and software
needed for the betterment and to make the network system more flexible.

Old View of the Nepal Bank:


The old networked system of the Nepal Bank was using workgroup-based network. Routers and
switches were used to connect the devices or nodes to the server. The networked system could not
fulfill the client’s requirement. It would be difficult to communicate between the computers. The
head office and the branch office had no central network connection. It would be difficult for the
branch office to connect with the head office. For the communication, every computers or the
devices had to be in the same network or same subnet or same local network. There is no
centralization and each user controls his/her own device. When the changes had to be made in the
network, manual change is required for each computer. The workgroup-based network could not
fulfill the overall requirement of the bank as there were many branch offices and it would be difficult
to be connected.

New View of the Nepal Bank:


There were various problems or flaws while using the old design or old networked system. The new
design was created with a view or aim to remove all the flaws of the old system and the system could
run effectively. The network design is based on client-server .i.e. domain based. Being domain based,
the centralization policy has been applied. All the clients are connected to the domain and domain
manages all the other resources required for the client computers. There is one administrator who
looks after the domain and the domain handles other users approving security measures and
managing the resources. The other important servers like Dynamic Host Configuration Protocol
(DHCP), Read Only Domain Controller (RODC), Child Domain Controller (CDC), Print, Virtual
Sujan Gautam (HND / First Semester)
45
Networking 2018

Private Network (VPN), etc. has been inculcated in the design, which greatly enhances the
networked system. Strong firewalls has also been used which addresses the security issues.

As the network design is domain based, it brings a lot of positive impacts or significance itself. The
main significance is domain based brought by the domain based network. Being in this type of
network, it is very much easier for the client as well as the administrator. In old network design,
whenever the system needs change, every computer must change individually where in new network
design there is no need to make changes throughout the computer as the changes made in the one
computer will change all others. The server roles have been configured which brings many features
and it makes easy for the clients and the administrator. RODC and CDC functions even if the
primary domain gets down. Due to VPN the branch, office is connected to the head office and head
office can get access to the information and resources. DHCP helps to dynamically assign the IP
address to all the clients and it would be far easy for the clients to operate. Hence, all these servers
operate to make the system reliable, effective and efficient.

Consequently, the new design view is far better and brings a lot new features than the old design,
which makes the networked system to run flawlessly.

Potential enhancement of the Networked System:


The work group based network was upgraded to domain based in new view of Nepal Bank
Networked System. The upgraded one brought very much new features and made the system to work
more effectively. Whole system is centralized. High quality network infrastructures were needed to
maintain this networked system. The major dare is to enhance the network by not affecting the
existing network. The various potential enhancements that can be carried out for the new design of
the networked system of Nepal Bank are recommended below:

 Hardware components:
Hardware is very much essential part in forming the network. The hardware components
include various devices, peripheral nodes, switched, routers etc. There are various network
devices used in the networked system and not all of them are of the best quality. If the
hardware devices are used of the best quality, then it will definitely enhance the networked
system. The routers and switches of Cisco can be used for reliability and flexibility in
network performance. In the same way, access point of Cisco can be used in data receiving
and transmission. The firewalls of juniper, Fortinet can be used to enhance the security of the
networked system, which ultimately helps to foster the overall networked system. Similarly,

Sujan Gautam (HND / First Semester)


46
Networking 2018

the printers of Canon, Brother can be used. Hence, using all the top quality devices the
overall networked system will be very much proficient.
 Cloud Computing:
Nepal Bank generally saves the important information by using data centers. There is no
availability of Cloud computing. So, cloud can be used in case of data centers for storing
data. The main feature of cloud computing is that is very fast and lets immediate interaction.
For the customers as well, it makes easier and simpler to get access to the resources and
information and as a result it greatly enhances the networked system.

Recommendation:
The infrastructures or device of the networked system when enhanced seems operate much quicker
and hence benefits the Bank by increasing the overall productivity. Some of the reasons for the
enhancement of the infrastructures of the networked system are discussed below:

 Increases the overall performance:


When the devices like routers, switches, firewalls, etc. are used of high quality then it
automatically increases the overall performance of the system and the system can function
very smoothly needing less time for more work.
 Strong security:
The firewalls of renowned company like Cisco, juniper will greatly address the security
issues. Firewall functions as traffic directing or barrier for the errors reaching to the files.
Hence, the security will be much stronger.
 Less failure of the network:
When the devices and components are enhanced, then there will be less failure of the network
and the system lesser malfunctions. Network related problems will very much be decreased
and increases the speed of the system.

So, there are many positive impacts coming from the potential enhancement of the infrastructure of
the networked system but ultimately it requires a huge budget. It requires much money for
maintaining and upgrading the devices and once the infrastructures are enhanced, various advantages
can be taken and will help to increase the efficiency of Nepal Bank.

Conclusion:
In summary, it can be said that potential enhancement of the various devices of the system will
eventually enhance the networked system. Various benefits can be withdrawn from it. It increases the

Sujan Gautam (HND / First Semester)


47
Networking 2018

overall performance of the network and hence makes the security system strong. The enhancement of
the networked system will increase the productivity of the Nepal Bank Limited.

Sujan Gautam (HND / First Semester)


48
Networking 2018

Task 7 [D1]
Considering a given scenario, identify the given topology protocol selected for the efficient
utilization of a networked system.

Introduction:
‘A network topology describes the arrangement of computer network. It defines how the workstation,
or nodes, within the network are arranged and connected to each other.’[ CITATION UKE13 \l
1033 ] So, it is the design of a network and how different nodes in a network are associated to each
other and how they correspond is determined by the network's topology. Basically, there are six kinds
of topologies like bus topology, star topology, ring topology, tree topology, mesh topology and
hybrid topology. All the topologies have their own advantages and disadvantages and it is very much
essential to select an appropriate topology for the networked system. Selection of topology should be
done on the basis of reliability, scalability, advantages of that topology, number of users to be served
by that topology, easy installation and ease of access.

Realizing the necessity of the topology, I have selected star topology and maximum benefits can be
taken from it. In this task, I have explained why I have chosen star topology for the network system
with the benefits and some recommendations.

Basic Network Topologies:


1. Bus Topology: This type of topology is not used much in recent times than it was used earlier.
It is a network type where all the nodes are connected to the single cable which is the
backbone and also known as Bus.
2. Ring Topology: ‘It is the type of topology where all the nodes are connected to each-other in
such a way that they make a closed loop’[ CITATION Pen10 \l 1033 ] It can also be said that,
it the topology where one node is connected to only two neighbors. The node with token is
responsible to send data, while other nodes have to wait for empty token to reach them.
3. Star Topology: It is the type of topology where all the nodes are connected to a central device
or element called hub or switch.
4. Tree Topology: Tree Topology incorporates the features of both Star and Bus Topology as the
star networks is connected using bus. A node is connected to other sub level-nodes making an
order, so it is also known as hierarchal topology.
5. Mesh Topology: In this topology, each node is connected to all other nodes to form a
complete mesh like structure. It is very much expensive to manage this type of topology.

Selection of the Appropriate Topology:


Sujan Gautam (HND / First Semester)
49
Networking 2018

Selection of topology should be done based on reliability, scalability, advantages of that topology,
number of users to be served by that topology, easy installation and ease of access. I have selected
star topology and maximum benefits can be taken from it. It is the type of topology where all the
nodes are connected to a central device or element called hub or switch. ‘In the star topology, one
central node or server workstation to which each of the other nodes on a network are directly
connected.’[ CITATION UKE13 \l 1033 ] The central device or hub works as a junction to connect
all the nodes in the star network and UTP. Ethernet cable is used to connect to the central node. It is
the most preferable model as it has many advantages and can be easily installed.

Star topology can be taken as the appropriate one for the efficient utilization of the networked
system. Some of the benefits of star topology is listed below which makes it selective one.

 Simplicity:
Simplicity means becoming simple and easy to understand. Star topology is simple and it is
easy for the learners to know about the star topology. ‘The topology is easy to understand,
establish, and navigate. The simple topology obviates the need for complex routing or
message passing protocols. Due to its centralized nature, the topology offers simplicity of
operation.’[ CITATION UKE13 \l 1033 ] It is easy to operate and connections as well. It is
very much easier to maintain this network, so is popular.
 Reliability:
Reliability means working consistently without disruption. ‘Single computer failure will not
disturb whole network, since all other computers are connected with separate links (wires) to
HUB. Definitely, they will work fine. Therefore, only the faulty computer will not be able to
communicate with other computers in the Local Area Network.’[ CITATION Per12 \l 1033 ]
Failure of one computer notes doesn’t affect the whole network. That means, data
communication and receiving signals is still possible.
 Better Performance:
Being in a star topology, data passing is minimized through excessive number of nodes. ‘At
most 3 devices and 2 links are involved in any communication between any two devices
which are part of this topology.’[ CITATION UKE13 \l 1033 ] In star topology, data packets
are sent very quickly without unnecessary transmission of data. High speed is the main
feature of star topology, so it gives better performance.
 Centralization:
‘The star topologies ease the chance of a network failure by linking all of the computers to a
central node. All computers may therefore communicate with all others by transmitting to and
Sujan Gautam (HND / First Semester)
50
Networking 2018

receiving from the central node only.’ [ CITATION UKE13 \l 1033 ] It means all the activities
depend upon the central hub because of which the system is called centralized. Traffic
controlling and maintaining good network connection can be all due to centralized nature of
star topology.
 Easy Troubleshooting:
It is very much easier to troubleshoot the problem when we are in a network of star topology.
As we all know how complex is the structure of Hybrid and Mesh topology and we don’t find
star topology that much complex because of which the troubleshooting is far easier.
Moreover, when we are in star topology, failure of one cable never affects in the data and
network communication. As all the nodes depend on the hub and not the cable, it is relatively
easier to find and solve the problems.

Recommendation:
As, we have discussed about the importance and benefits star topology has over the other network
topology, still there are some drawbacks or the negative impacts which should be addressed. The cost
of cabling and the hub which is needed in a star topology is very high; everything is dependent upon
the hub and if the hub fails then the system collapses. These are the minor flaws, we can have when
we are in star topology but we can have it only in longer run. Therefore, among the different
topologies, we can find star topology far beneficial and with less flaws. Nowadays, we can find star
topologies in homes and offices very much due to its easy and advantageous nature. Therefore, we
can keep aside the minimum disadvantages that we get from star topology and maximum spotlight
must be given up for its installation.

Conclusion:
To sum up, we can say that star topology has huge advantages. Networked system would be very
much efficient due to the effective nature of star topology. Maximum requirements can effectively be
met by the star topology and for effective working of star topology, focus should be given to hub to
make it best as all the nodes or the computers depend upon the hub. Star topology can be the best
choice for the networked system mainly due to its minimum flaws and addressing the problem of hub
which is heart of the topology.

Task 11 [D2]
Design a maintenance schedule to support the networked system.

Sujan Gautam (HND / First Semester)


51
Networking 2018

Introduction:
Network maintenance is very much essential as it keeps up the network and the networked system
can run in an efficient way. It is necessary for the networked system to be checked routinely by the
administrator. Network maintenance generally ensures reliability of the system enhance the
productivity of the company. In order to go for network maintenance, you must have a plan for it. It
is necessary to make a detail schedule which is basically called maintenance schedule.

In this task, I have designed a maintenance schedule of 3 days for the networked system of the Nepal
Bank Limited. While designing I considered backups, upgrades, security and auditing as the main
areas. I have also provided justification about the maintenance tasks.

Sujan Gautam (HND / First Semester)


52
Networking 2018

Maintenance Schedule:
Date Time Maintenance Tasks

5/16/201 10 AM – 11 AM Review the infrastructural needs


8
11 AM – 12 PM maintaining device configurations like hardware

12 PM – 2 PM Installing, replacing or upgrading software and hardware

TEA BREAK

2:30 PM – 3:30 PM Review the server for errors and optimization

3:30 PM – 4:30 PM Documentation of the network and keeping it up to date

4:30 PM – 5 PM Back up notification and checking spots

5/17/201 10 AM – 11 AM Network upgrades and extensions planning


8 11 AM – 2 PM Patching Server

TEA BREAK

2:30 PM – 3:30 PM Antivirus installation and securing network from threats

3:30 PM – 5 PM Ensuring compliance with legal regulations

5/18/201 10 AM – 11 AM Database Maintenance


8
11 AM – 2 PM Firewalls and security audits

TEA BREAK

2:30 PM – 4 PM Troubleshooting problems

4 PM – 5 PM Review backup scope and retention

The table in the above shows the various network maintenance tasks carried out for 3 days for the
betterment of the networked system. Maintenance task included server maintenance, backup and
security checks, etc. They are briefly discussed below:

DAY 1:

The description of the maintenance task scheduled for the first day is given below:

Sujan Gautam (HND / First Semester)


53
Networking 2018

 Review the infrastructural needs:


Firstly, to set up and maintain the network, review of the various physical and infrastructural
needs should be done. Examine the switches, routers, cables and other devices. It is scheduled
as first maintenance task as initially it is necessary to review the infrastructural factors of the
networked system and maintained it.
 Maintaining device configurations:
The proper configuration of the device is also very much necessary. Proper review should be
done about how various hardware and peripheral devices are connected for the establishment
of the network. Configuration nowadays changes very soon as there are day-to-day many
technologies invented, so, device configuration should also be reviewed and maintained.
 Installing, replacing or upgrading hardware and software:
Upgrading or reviewing hardware and software is the common maintenance task and it is
vital to upgrade and replace the older software with the newer one as it enhances and brings a
lot of new features. Similarly, hardware like switches and old routers must be replaced for the
efficient running of the system.
 Review the server for errors and optimization:
The overall performance of the server was observed and full optimization of the server should
be done for the better and faster running of the system. Reviewing must be done of the server
for errors and eradicate it.
 Documentation of the network and keeping it up to date:
Creating documentation and keeping it up to mark or date is very vital and comes under the
network maintenance task. When the document is created, it gives us information about the
data flowing as well as the connection among different devices which are in network. Hence,
it is one of the important maintenance tasks that should be done.
 Back up notification and checking spots:
The backup notification problem was addressed and solved without taking much time and to
verify the read/write success backup spot check was performed.

DAY 2:

The description of the maintenance task scheduled for the second day is given below:

 Network upgrades and extensions planning:


‘Using network monitoring, you can identify potential issues before they arise as well as plan
for possible network upgrades or expansions, i.e. capacity planning, based on the identified

Sujan Gautam (HND / First Semester)


54
Networking 2018

potential issues.’[ CITATION How18 \l 1033 ] Proper plan should be made for the network
upgrades which is very much necessary and extensions also should be thought in the network
maintenance task
 Patching Server:
‘Depending on the server roles, various patches are applied, critical updates were updated and
suitable window was confirmed with the client, check backups, apply critical patches, reboot,
and test server functions’[ CITATION Fir16 \l 1033 ]. It very much necessary to do patching
of server and it also comes under the maintenance task that was scheduled for second day.
 Antivirus installation and securing network from threats:
The basic and the integral part of network maintenance is the network security. The
networked system must be away from all the internal and external threats. So, the security of
the network was reviewed and checked if it needed any maintenance before any of the threats
occur.
 Ensuring compliance with legal regulations:
‘A structured network maintenance methodology also ensures that the network is compliant
with both legal obligations and policies.’[ CITATION How18 \l 1033 ] The networked system
is ensured with the legal regulation in order to help the network to form a reliable and
functioning one. Effective networked system can be made by checking if the system is
ensured.

DAY 3:

The description of the maintenance task scheduled for the third day is given below:

 Database Maintenance:
Database server is an important part in a company. They should be monitored and reviewed
time to time if they were properly functioning. The database servers like SQL server, oracle
must be reviewed and running process must be checked.
 Firewalls and security audits:
It is very much essential to protect the networked system from threats. In order to protect the
system, the firewalls must be audited or checked if it functions effectively or not. It is very
much essential to check the security system in the context of networked system.
 Troubleshooting problems:

Sujan Gautam (HND / First Semester)


55
Networking 2018

Troubleshooting some of the arise problems is one of the important maintenance task. The
problems must be resolved as soon as possible for the system to function and work in a
smooth way. So, significant time must be given for troubleshooting the aroused problems.
 Review backup scope and retention:
Backup is the routine and regular maintenance task. Backup is very important for the
networked system. The core network components and devices are verified ensured backed up.
The verification of the data retention policy was done and for backing up data, pre-defined
retention schedule was adhered.

Conclusion:
In summary, the three days maintenance task has been clearly defined and explained the importance
of each of the task. Fundamentally, the network maintenance is very much essential to keep up the
networked system. Routine maintenance must be done of the networked system for it to run properly
and efficiently. Thus, for anyone’s system to work in an effective way with no any technical issues,
the above scheduled maintenance task should be properly and routinely completed.

Sujan Gautam (HND / First Semester)


56
Networking 2018

Task 15 [D3]
Use critical reflection to evaluate own work and justify valid conclusions.

Introduction:
Basically, a networked system provides or gives the information about all the network components,
devices and how they are connected to each other for sharing of information. It is quite necessary or
important to properly maintain and govern the system for the efficient running of the system. As the
Nepal Bank needs a high quality networked system, domain based network is of vital importance.
The high quality network components and devices are set up which in present and in the near future
helps in smooth, efficient and effective running of the networked system. The networked system was
designed addressing all the problems in the old design and meeting the client requirements.

In this task, I have evaluated or reviewed the network design, test plans of the proposed design and
diagnosed the implemented network. I have also given the positive and negative aspects or factors
including the recommendation for the networked system.

Network Design:
There were various problems or flaws while using the old design or old networked system. The new
design was created with a view or aim to remove all the flaws of the old system and the system could
run effectively. The network design is based on client-server .i.e. domain based. Being domain based,
the centralization policy has been applied. All the clients are connected to the domain and domain
manages all the other resources required for the client computers. There is one administrator who
handles the domain and the domain handles all other users in the system. It also approves the security
requests. The other important servers like Dynamic Host Configuration Protocol (DHCP), Read Only
Domain Controller (RODC), Child Domain Controller (CDC), Print, Virtual Private Network (VPN),
etc. has been inculcated in the design, which greatly enhances the networked system. Strong
firewalls has also been used which addresses the security issues.

Positive aspects of the Designed Network:


As the network design is domain based, it brings a lot of positive impacts or significance itself. The
main significance is domain based brought by the domain based network. Being in this type of
network, it is very much easier for the client as well as the administrator. There is centralized user
management. There is one administrator who looks after the domain and the domain handles other
users approving security measures and managing the resources. In old network design, whenever the
system needs change, every computer must change individually where in new network design there
is no need to make changes throughout the computer as the changes made in the one computer will
Sujan Gautam (HND / First Semester)
57
Networking 2018

change all others. The server roles like Read Only Domain Controller (RODC), Child Domain
Controller (CDC), Virtual Private Network (VPN), Print, Dynamic Host Configuration Protocol etc.
have been configured which brings many features and it makes easy for the clients and the
administrator. RODC and CDC functions even if the primary domain gets down. Due to VPN the
branch, office is connected to the head office and head office can get access to the information and
resources. DHCP helps to dynamically assign the IP address to all the clients and it would be far easy
for the clients to operate. Hence, all these servers operate to make the system reliable, effective and
efficient.

Negative Aspects of the Network Design:


We can get many significances from this networked system and yet some of the limitations are in
existence. There is no availability of Secondary DNS. The secondary DNS is required because it
offers security through redundancy and it functions to moderate the resource load on primary DNS.
The system does not operate properly as it should have due to improper separation of DNS server.
The cloud computing has to be established for securing as it enables data recovery and backup. There
should also be the enhancement of the VPN server .i.e. practically should be configured, as many
users cannot be habituated with VPN services. Security issues have to be fully emphasized.

Network Topology:
Selection of topology should be done on the basis of reliability, scalability, advantages of that
topology, number of users to be served by that topology, easy installation and ease of access. I have
selected star topology and maximum benefits can be taken from it. In the networked system, star
topology has been used for connection of various nodes and configuration of routers, switches and
other devices has been done according to star topology.

Diagnosis of the Implemented System:


After designing the networked system, it was implemented. Various test and evaluation was done
after the implementation of the system. The configuration of various servers was done and the result
outcomes were evaluated properly. The actual output was properly matched up with the expected
output and document of testing was created. The system was analyzed very carefully. The firewalls
were checked if it was properly working or not. The running capacity of the system was tested and
examined if it can properly meet the client’s requirement. The productivity test was carried out of the
networked system whether it is running smoothly or not. Hence, by auditing all the system, it was
clearly observed that the system is reliable, scalable and fulfils the entire client’s requirement.

Recommendation for Improvements:


Sujan Gautam (HND / First Semester)
58
Networking 2018

As there are many branches of Nepal bank, the same-networked system cannot meet all the
requirements in the near future. There is only primary DNS and it cannot alone handle all the work in
near future and will result to the failure of the network. There is no availability of Secondary DNS.
The secondary DNS is required because it offers security through redundancy and it functions to
moderate the resource load on primary DNS. The system does not operate properly as it should have
due to improper separation of DNS server. The cloud computing has to be established for securing as
it enables data recovery and backup. The cloud offers unlimited storage for storing data, which will
be very vital. There should also be the enhancement of the VPN server .i.e. practically should be
configured, as many users cannot be habituated with VPN services. Security issues have to be fully
emphasized. If we look after some of the flaws and reduce it, then it would be the best for the Nepal
Bank Limited and it would greatly increase the productivity. The system can get much better in
future as there is the opportunity of the scalability and we can add extra features to the system.
Looking after the security, reliable and scalable nature of this networked system; it will run very
smoothly and will be productive for the Nepal Bank Limited.

Conclusion:
In summary, the overall network design was evaluated and tested to meet the client’s requirement.
The networked design was properly implemented and diagnosis was done which all showed that the
networked system functions well. The positive and negative aspects were identified and proper
solutions were given to the issues. Therefore, after auditing security, reliable and scalable nature of
this networked system; it will run very smoothly and will be productive for the Nepal Bank Limited.

Bibliography

Sujan Gautam (HND / First Semester)


59
Networking 2018

Anon., n.d. Techopedia Inc. [Online]


Available at: https://www.techopedia.com/definition/19935/ieee-802
[Accessed 22 May 2018].

Beal, V., n.d. webopedia. [Online]


Available at: https://www.webopedia.com/TERM/H/HTTP.html
[Accessed 19 May 2018].

Beal, V., n.d. Webopedia. [Online]


Available at: https://www.webopedia.com/TERM/C/centralized_network.html
[Accessed 13 May 2018].

Bradely Mitchell, 2018. Lifewire. [Online]


Available at: https://www.lifewire.com/layers-of-the-osi-model-illustrated-818017
[Accessed 19 May 2018].

Bradley Mitchell, 2018. LifeWire. [Online]


Available at: https://www.lifewire.com/introduction-to-client-server-networks-817420
[Accessed 12 May 2018].

BreBru, n.d. BreBru. [Online]


Available at: http://brebru.com/aplusstudyguides/netmediapart1.html
[Accessed 18 March 2018].

Colocation America, n.d. Colocation America. [Online]


Available at: https://www.colocationamerica.com/blog/blade-servers-can-save-you-money
[Accessed 20 May 2018].

ComputerHope, 2017. ComputerHope. [Online]


Available at: https://www.computerhope.com/jargon/n/network.htm
[Accessed 1 April 2018].

Desktop Class, 2011. Desktop Class. [Online]


Available at: https://www.desktopclass.com/computer-it/different-types-of-network-standards.html
[Accessed 12 May 2018].

Firstfocus, 2016. maintenance. [Online]


Available at: http://www.firstfocus.com.au/business-it-support/business-it-supportnetwork-

Sujan Gautam (HND / First Semester)


60
Networking 2018

maintenance/
[Accessed 6 april 2018].

FOSS BYTES, 2016. FOSS BYTES. [Online]


Available at: https://fossbytes.com/networking-devices-and-hardware-types/
[Accessed 15 May 2018].

Hope, C., 2017. Computer Hope. [Online]


Available at: https://www.computerhope.com/jargon/d/domainco.htm
[Accessed 1 April 2018].

HowToNetwork, n.d. HowToNetwork. [Online]


Available at: https://www.howtonetwork.org/tshoot/module-1/network-maintenance-tasks/
[Accessed 21 May 2018].

Maragaret, 2015. [Online]


Available at: https://whatis.techtarget.com/definition/Web-server
[Accessed 15 May 2018].

Mitchell, B., 2018. Lifewire. [Online]


Available at: https://www.lifewire.com/definition-of-network-switch-817588
[Accessed 12 May 2018].

Osama, W., 2008. Netwrokers-online. [Online]


Available at: http://www.networkers-online.com/blog/2008/08/network-design-evaluation/
[Accessed 21 May 2018].

Packard, H., n.d. Hewlett Packard Enterprise. [Online]


Available at: https://www.hpe.com/us/en/product-catalog/servers/proliant-servers/pip.hpe-proliant-
bl460c-gen10-server-blade.1010025832.html
[Accessed 20 May 2018].

Penna Sparrow, 2010. I answer 4 u. [Online]


Available at: http://www.ianswer4u.com/p/about-us.html#axzz59zzD1FtP
[Accessed 2018].

Perfect Computer Notes, 2012. Perfect Computer Notes. [Online]


[Accessed 2018].

Sujan Gautam (HND / First Semester)


61
Networking 2018

Rouse, M., 2008. TechTarget. [Online]


Available at: https://searchdatacenter.techtarget.com/definition/blade-server
[Accessed 20 May 2018].

Rouse, M., 2010. TechTarget. [Online]


Available at: https://searchmobilecomputing.techtarget.com/definition/access-point
[Accessed 15 May 2018].

Rouse, M., 2016. WhatIs.com. [Online]


Available at: http://searchwindowsserver.techtarget.com/definition/RODC-read-only-domain-
controller
[Accessed 1 April 2018].

Rouse, M., 2017. TechTarget. [Online]


Available at: https://searchnetworking.techtarget.com/definition/TCP-IP
[Accessed 19 May 2018].

SDX Centre, 2012. SDX Centre. [Online]


Available at: https://www.sdxcentral.com/cloud/definitions/all-about-cloud-networking/
[Accessed 12 May 2018].

Shekhar, A., 2017. OSI model. [Online]


Available at: https://fossbytes.com/osi-model-7-layers-osi-model-explained/
[Accessed 6 march 2018].

skfdjskdfjs, n.d. sdfsdf. [Online]


[Accessed 2014].

Springer, 2014. Springer. [Online]


[Accessed 19 May 2018].

Study.com, n.d. Study.com. [Online]


Available at: https://study.com/academy/lesson/what-is-a-server-definition-lesson-quiz.html
[Accessed 15 May 2018].

StudyTonight, n.d. StudyTonight. [Online]


Available at: https://www.studytonight.com/computer-networks/network-topology-types
[Accessed 2 April 2018].

Sujan Gautam (HND / First Semester)


62
Networking 2018

Tanenbaum, A. S., 2003. Computer Networks. Fourth ed. India: Dorling Kinddersley Pvt.Ltd.

techopedia, 2006. [Online]


Available at: https://www.techopedia.com/definition/4528/protocol
[Accessed 19 May 2018].

Techopedia, n.d. Techopedia. [Online]


Available at: https://www.techopedia.com/definition/24201/domain-name-system-dns
[Accessed 1 April 2018].

Techopedia, n.d. Tecopedia. [Online]


Available at: https://www.techopedia.com/definition/25777/peer-to-peer-network-p2p-network
[Accessed 12 May 2018].

TechTarget, 2006. TechTarget. [Online]


Available at: https://searchexchange.techtarget.com/definition/cluster
[Accessed 12 May 2018].

TechTarget, n.d. TechTarget. [Online]


Available at: https://searchnetworking.techtarget.com/definition/virtual-private-network
[Accessed 12 May 2018].

TechTerms, 2016. TechTerms. [Online]


Available at: https://techterms.com/definition/ip_address
[Accessed 1 April 2018].

UKEssays, 2013. UKEssays. [Online]


Available at: https://www.ukessays.com/essays/communications/function-of-network-topology-
communications-essay.php#citethis
[Accessed 2 April 2018].

Webopedia, 2016. Webopedia. [Online]


Available at: https://www.webopedia.com/Networks/Networking_Standards
[Accessed 17 May 2018].

xgxdfd, n.d. xxfdxd. [Online]


[Accessed 2010].

Sujan Gautam (HND / First Semester)


63
Networking 2018

Sujan Gautam (HND / First Semester)


64

You might also like