Networking - Assignment - Docx COURSE Hero
Networking - Assignment - Docx COURSE Hero
Networking - Assignment - Docx COURSE Hero
Table of Contents
Task 1 [P1].............................................................................................................................................6
Introduction:...........................................................................................................................................6
Network Standards:................................................................................................................................9
Conclusion:...........................................................................................................................................11
Task 2 [P2]...........................................................................................................................................12
Introduction:.........................................................................................................................................12
Conclusion:..........................................................................................................................................15
Task 4 [P3]...........................................................................................................................................16
Introduction:.........................................................................................................................................16
Networking Devices:............................................................................................................................16
Types of Server:...................................................................................................................................18
Conclusion:..........................................................................................................................................19
Task 5 [P4]...........................................................................................................................................20
Introduction:.........................................................................................................................................20
Hardware Requirements:......................................................................................................................20
Software Requirements:.......................................................................................................................21
Conclusion:..........................................................................................................................................22
Task 8 [P5]...........................................................................................................................................23
Introduction:.........................................................................................................................................23
Conclusion:..........................................................................................................................................28
Task 9 [P6]...........................................................................................................................................29
Introduction:.........................................................................................................................................29
Test Log:...............................................................................................................................................29
Conclusion:..........................................................................................................................................33
Task 13 [P8].........................................................................................................................................34
Introduction:.........................................................................................................................................34
Conclusion:..........................................................................................................................................39
Task 3 [M1]..........................................................................................................................................40
Introduction:.........................................................................................................................................40
Network Protocols:...............................................................................................................................42
Conclusion:..........................................................................................................................................44
Task 6 [M2]..........................................................................................................................................45
Introduction:.........................................................................................................................................45
Range of Server:...................................................................................................................................45
Selection of Server:..............................................................................................................................46
Conclusion:..........................................................................................................................................47
Task 14 [M4]........................................................................................................................................48
Introduction:.........................................................................................................................................48
Recommendation:................................................................................................................................50
Conclusion:..........................................................................................................................................50
Task 7 [D1]...........................................................................................................................................52
Introduction:.........................................................................................................................................52
Recommendation:................................................................................................................................54
Conclusion:..........................................................................................................................................54
Task 11 [D2].........................................................................................................................................55
Introduction:.........................................................................................................................................55
Maintenance Schedule:........................................................................................................................56
Conclusion:..........................................................................................................................................59
Task 15 [D3].........................................................................................................................................60
Introduction:.........................................................................................................................................60
Network Design:..................................................................................................................................60
Network Topology:..............................................................................................................................61
Conclusion:..........................................................................................................................................62
Bibliography.........................................................................................................................................63
Task 1 [P1]
Discuss the benefits and constraints of different network types and standards.
Introduction:
Network can be defined as the group of computers or devices connected in order to share data and
information. There are various types of network and each has their own importance and provides
different services. ‘The network standards are the documents that contain technical and physical
specifications about the network being designed.’[ CITATION Des11 \l 1033 ] The reliability and
efficiency of the network can be seen by the certain standards. It can also be said that it is very much
essential for the standards to keep in order for the network to function properly.
In this task, I have provided and discussed about the various network system types such as peer-
based, client-server, cloud, centralized, cluster, virtualized including the different types of network
standards such as OSI model and TCP/IP model.
Client-Server Network:
Sujan Gautam (HND / First Semester)
5
Networking 2018
‘The term client-server refers to a popular model for computer networking that utilizes both
client hardware devices and servers, each with specific functions.’[ CITATION Bra181 \l
1033 ] Client-Server is the network architecture where the powerful one is server and the
client relies upon server for the data operation.
Benefits: There are some of the good benefits of client-server network. In client- server we
don’t find the central user and the overall system is centralized .i.e. operated by the server.
The data backup and recovery, which is very much difficult in peer to peer, is possible and
easier in client-server model. The server authorizes everything .i.e. everything is governed by
server and has various roles to play for the client.
Constraints: With some benefits, there are constraints as well. In comparison to peer-to-peer,
it is difficult to maintain client server and requires specialists and professionals for
maintenance. The maintenance and installation cost is very high of client server network.
Cloud:
‘Cloud networking (and Cloud based networking) is a term describing the access of
networking resources from a centralized third-party provider using Wide Area Networking
(WAN) or Internet-based access technologies.’[ CITATION SDX12 \l 1033 ] Simply we can
say that it provides us the opportunity to store the files and information in the internet and
access it by our own choice.
Benefits: We can have various benefits by being in a cloud based networking. The data
backup and recovery is easier and possible. It is very much easier to maintain and upgrade
this network and the cost is also affordable. There is unlimited storage which makes the
storing very much easy.
Constraints: With benefits, there are some of the constraints as well of using cloud
networking. Hacking being the main problem as there is privacy and security issues. The
information or resources is entrusted upon the third-party. The users of cloud have very less
or limited access or control to the resources and information. There is a possibility of having
technical issues as well because it requires connection of the internet.
Cluster:
‘In a computer system, a cluster is a group of servers and other resources that act like a single
system and enable high availability and, in some cases, load balancing and parallel
processing.’[ CITATION Tec061 \l 1033 ] Therefore, clustering is the process where two
computers are linked together to form a single computer and is very useful as it works as a
redundant solution.
Benefits: We can get various benefits by being in a cluster network. The main feature is
scalability as we can add other features and resources to the cluster. The cluster network is
very efficient and designed usually for high availability solution. The information sharing is
also very fast in cluster network.
Constraints: With benefits, there are some constraints as well of cluster network. The
installation and maintenance cost is very much high as it requires many hardware and servers
to manage leading to high cost. The cluster network is not much flexible due to which many
of the applications are not supported.
Centralized Network:
‘A type of network where all users connect to a central server, which is the acting agent for
all communications is called centralized network. This server would store both the
communications and the user account information.’[ CITATION Van18 \l 1033 ] Simply, it
means that everything is in charge of the provider or everything is in control of central
administrator.
Benefits: We can have various benefits in a centralized network. There is the presence and
role of central administrator due to which all, the responsibilities are clearly stated and well
governed. The decision-making is understandable with clear point.
Constraints: With benefits, there are some of the constraints as well of centralized network.
As the central administrator governs all the activities so failure of main server has the vital
affect to the entire network. Due to centralized nature, there is limited and low diversity,
which inhibits users from getting the required information.
Virtualized Network:
‘Network virtualization (NV) is defined by the ability to create logical, virtual networks that
are decoupled from the underlying network hardware to ensure the network can better
integrate with and support increasingly virtual environments.’[ CITATION SDX12 \l 1033 ]
There is basically the feature of remote access due to the problem solving is easier and one
computer problem can be solved by another one by remote service.
Benefits: We can have various benefits in a virtualized network. In this network, one
computer administrator can take command of the other computer, which is beneficial. It
provides a feature to share, access files and resources from one computer to another by
remote access.
Constraints: With benefits, there are some constraints as well. There is the lack of better
performance due to the slow internet connection. It has security and privacy issues as there is
no security features in many of the virtual system.
Network Standards:
‘Networking standards ensure the interoperability of networking technologies by defining the rules
of communication among networked devices.’[ CITATION Web16 \l 1033 ] We can say that there
are two conceptual model which are TCP/IP and OSI model also known as network standards and
they illustrate how networks should work for the proper functioning of network protocols. TCP/IP
and OSI layer has been discussed below:
TCP/IP model:
It is one of the most important models based on the thought of stack of independent protocol.
It is known as Transmission Control Protocol and Internet Protocol having four important
layers. TCP/IP model is not much of use but the protocols have much significance and are
very much in use. The four layers are discussed below and each has their own significance
and importance in their own respective terms.
1. The Internet Layer
2. The Transport Layer
3. The Application Layer
4. The Host-to-Network Layer
Benefits: It is used in the internet architecture. The main work of internet layer is to permit
hosts to inject packets into any network and have they travel independently to the destination
(potentially on a different network).[ CITATION And03 \l 1033 ] Every layer likewise has
their own work and benefits. It is based upon the client/server model. Another important
merit is scalability in nature and can be operated independently. Due to internet layer, the
connection between the two computers is set up supporting excessive number of routing
protocols.
Constraints: The protocols are widely used rather than the model. The protocols being much
used is difficult to replace. The problem of model fitting the protocol is that any protocol
stacks is able to fit the model. The concepts, which are central to the OSI layer like services,
interfaces and protocols, are not distinct in TCP/IP model. Another constraint is that it cannot
be used in various other applications.
OSI model:
It is called as Open System Interconnection as it is open for the communication with other
systems. ‘OSI model itself is not network architecture because it does not specify the exact
services and protocols to be used in each layer.’[ CITATION And03 \l 1033 ] There are
various layers in OSI model, each model has its own work and OSI model just says what each
layer must do. The layers present are discussed below:
1. The Physical Layer
2. The Data Link Layer
3. The Network Layer
4. The Transport Layer
5. The Session Layer
6. The Presentation Layer
7. The Application Layer
Benefits: As I have described above that TCP/IP has not separated services, interfaces and
protocols which has been clearly distinct by OSI model. The OSI layer is easy to understand
than TCP/IP and is clear-cut. Another benefit can be that the connectionless and connection
adjusted communication is supported by OSI model with the protocols being flexible to
adopt. We get many choices when we use OSI model and it has very much less privacy issue.
Constraints: There are as well some of the constraints of OSI model. ‘The OSI model is not
biased towards one particular set of protocols, a fact that made it quite general.’ [ CITATION
And03 \l 1033 ]The protocol is difficult to fit like adding of a new protocol; the layers don’t
work in similar pattern so, interdependence exists between the layers as it takes time for data
communication from the precursor.
IEEE 802.x:
‘IEEE 802 is an Institute of Electrical and Electronics Engineers (IEEE) standard set that
covers the physical and data link layers of the OSI model.’[ CITATION Tec183 \l 1033 ]
There are basically six types of network standards developed IEEE i.e. 802.1 802.2 and so on.
IEEE 802.1 is mainly associated to network management and IEEE 802.2 is related to OSI
model. Generally IEEE 802 illustrates the features, services and protocols for network.
Conclusion:
Thus, various types of network and the other network standards have their respective importance and
operation in their respective fields. TCP/IP and OSI model are the part of the reference or considered
as conceptual model for network standards. As we know that network architecture reflects the design
of the networked system, so, TCP/IP and OSI defines the obligations for communication among the
network device present in the architecture.
Task 2 [P2]
Explain the impact of Network Topology, communication and bandwidth requirements.
Introduction:
A topology is basically the physical arrangement or layout of a network that determines how the
network's computers are connected. ‘A network topology describes the arrangement of computer
network. It defines how the workstation, or nodes, within the network are arranged and connected to
each other.’[ CITATION UKE13 \l 1033 ] So, it is the design of a network and how different nodes in
a network are associated to each other and how they correspond is determined by the network's
topology. The network topology illustrates the arrangement of computer network.
In this task, I have clarified about the various types of network topologies and including its impacts
and the speed of data transmission and the way the communication is made in each of the topologies.
1) Bus Topology: This type of topology is not used much in recent times than it was used earlier.
It is a network type where all the nodes are connected to the
single cable which is the backbone and also known as Bus. It
is very easy and requires less capital to set up. ‘A terminator is
added at ends of the central cable, to prevent the bouncing of
signals. A barrel connector can be used to extend it.’ Fig. 1: Bus Topology
[ CITATION Pen10 \l 1033 ] Two terminators and a barrel
connector can be clearly seen in fig. 1 which is a simple figure of bus topology.
Here, all the nodes are connected to the same line. Some of the positive impacts of using this
topology are: It is very much easy to do cabling and easy to connect to the devices; the cost is
relatively cheap and used in small networks. There are some of the negative impacts also by
using this topology: As all the nodes are associated to the same source and they receive signal
from it, there is low security; the entire cable is dependent upon the central cable so if the
main cable gets affected then whole system gets affected. ‘The bus topology of supported
media co-axial cable of designation 10Base-5 has a bandwidth of 10 mbps of maximum
segment length 500m.’ [ CITATION Bre18 \l 1033 ] In bus topology, data transmission can be
done by only one device at any one time. When more devices are added to the bus, collision
will take place and it will affect the network, i.e. network will be slower.
2) Star Topology: It is the type of topology (Fig. 2) where all the nodes are connected to a central
device or element called hub or switch. ‘In the star topology, one
central node or server workstation to which each of the other
nodes on a network are directly connected.’[ CITATION
UKE13 \l 1033 ] The central device or hub works as a junction
to connect all the nodes in the star network and UTP Ethernet
cable is used to connect to the central node. Fig. 2: Star Topology
3) Ring Topology: ‘It is the type of topology where all the nodes are connected to each-other in
such a way that they make a closed loop. Sending and receiving
of data takes place by the help of TOKEN.’[ CITATION Pen10 \l
1033 ] It can also be said that, it the topology where one node is
connected to only two neighbors. The node with token is
responsible to send data, while other nodes have to wait for empty token to reach them. Ring
topology is understandable by fig. 3 given there.
4) Tree Topology: Tree Topology incorporates the features of both Star and Bus Topology as the
star networks is connected using bus. ‘In this type of topology
one root node is connected to all other nodes forming a hierarchy
and also called hierarchal topology.’[ CITATION Stu18 \l 1033 ]
That is, a node is connected to other sub level-nodes making an
order. Fig. 4 is a basic diagram of Tree topology which is
Fig. 4: Tree Topology
clearly understandable.
5) Mesh Topology: ‘In a mesh topology, each of the network node, computer and other devices,
are interconnected with one another. Every node not only sends its own signals but also relays
data from other nodes.’[ CITATION Pen10 \l 1033 ] In fact, in this type of
topology, each node is connected to all other nodes to form a complete mesh
like structure. It is very much expensive to manage this type of topology
and it is not much used. Fig. 5 is a basic diagram of Tree topology
Fig. 5: Mesh Topology
which is clearly understandable.
Conclusion:
Network topology is the layout of a network and without the knowledge and better understanding of
various types of topologies; efficient network can never be built. As all the topologies have their own
advantages and disadvantages so we have to choose wisely the efficient one that suits the
requirement effectively. In today’s world, we all want our information sent and received quickly and
it can be all due to network topologies and devices so having the knowledge of network topology is
very much vital.
Task 4 [P3]
Discuss the operating principles of networking devices and server types.
Introduction:
Networking devices have a very much vital role to play in the context of computer networks. There
are different networking devices till date and every networking device have their own importance
and functions to play. Mainly networking devices are connected to the computer for sharing files and
information. Various networking devices at different segments have their own work to perform. Any
device that operates server software or programs could be considered a server. Server accepts and
responds to the requests made by the client.
In this task, I have clearly mentioned and illustrated about the operating principles of different
networking devices and servers which are important factor in computer networks.
Networking Devices:
‘Different networking devices have different roles to play in a computer network. These network
devices also work at different segments of a computer network performing different
works.’[ CITATION FOS16 \l 1033 ] Mainly networking devices are connected to the computer for
sharing files and information and various networking devices at different segments have their own
work to perform. Some of the networking devices with their operating principle are mentioned
below:
1. Hub:
‘Network Hub is a networking device which is used to connect multiple network hosts. A
network hub is also used to do data transfer.’ [ CITATION
FOS16 \l 1033 ] Hub (Fig.1) is among the different
networking devices and it connects different networking
devices physically together as it functions as a physical layer.
2. Router:
Router (Fig.2) is simply the networking device which has the function or work to forward
data packets or the information from one network to another
performing the traffic directing or reducing action.
Operating principle:
When the data packets are received by the router, it works to
Fig. 2 Router
determine the address location to forward and after finding the location
it searches in the routing table to get know how to reach the destination and forwards the data
packets or information.
3. Switch:
‘A network switch is a small hardware device that centralizes communications among
multiple connected devices in one local area network (LAN).’[ CITATION Bra18 \l 1033 ] A
switch (Fig. 3) can be used to connect individual computers or
different devices to bring together in a network for sharing files
Operating principle:
The working principle of the switch is that it inspects the Fig. 3 Switch
incoming packets and resources and transfers the data packets and
information to the only devices which are connected to the destination.
4. Firewall:
Firewall (Fig. 4) can be termed or defined as the windows or network security system that
inhibits the foreign access to the private networks. It also
functions as traffic directing or barrier for the errors
reaching to the files.
The main principle of the working of the repeater (Fig. 5) is that it receives the signals or
frequency and transmits it to the longer distance. It operates similar as that of the satellites.
6. Bridge: Fig. 5 Repeater
Bridge (Fig. 6) is a networking device that builds a layer for the connection
between the two networks using the same protocol.
Operating Principle:
Fig. 6 Bridge
It operates as a data link layer and connects different networks together
in order to form the communication between them.
7. Access Point:
Access Point is a networking device that acts as a station for data
receiving and transmission and also provides the opportunity for
Wi-Fi devices to connect to a wired network.
Types of Server:
Server can be considered a device, which has the ability to operate the server programs and
applications. Various servers were used in networked system of Nepal Bank Limited. Some of the
server types are:
Web Server:
‘A Web server is a program that uses HTTP (Hypertext Transfer Protocol) to serve the files
that form Web pages to users, in response to their requests, which are forwarded by their
computers' HTTP clients.’[ CITATION Mar15 \l 1033 ] Web server is basically used for
developing the web pages and websites. It is very much helpful as the main feature of the
web server is to display or read the content of the websites.
File Server:
‘A file server is a server that contains files which are made accessible to other clients on the
network. A file server has the sole responsibility for storing and managing a set of files,
which are made accessible to other computers.’[ CITATION Stu181 \l 1033 ] We can say that
Sujan Gautam (HND / First Semester)
17
Networking 2018
file server is an important server in networking because it makes the files accessible to the
clients on the same network. The files that are shared to the clients and file server can be any
device, which holds the permissions for the files and forwards them.
Database Server:
‘Database server is the term used to refer to the back-end system of a database application
using client/server architecture.’[ CITATION Van18 \l 1033 ] It basically operates on the
network based application and functions to store and manage the databases. It also features to
grant access to the approved users only and mainly used for storing, manipulating and
analyzing of the data.
Virtualization:
‘Virtualization is defined by the ability to create logical, virtual networks that are decoupled
from the underlying network hardware to ensure the network can better integrate with and
support increasingly virtual environments.’[ CITATION SDX12 \l 1033 ] There is basically
the feature of remote access due to the problem solving is easier and one computer problem
can be solved by another one by remote service. There are some of the benefits as well. One
computer administrator can take command of the other computer and by remote access we
can share access to various files and resources.
Print Server:
A printer server is the server role which gives the member client the feature to get access the
printer from the servers which are in network. It allows the user host to get the printer from
the server where printer is installed and the member can print.
Conclusion:
Network devices and various servers with their proper management are very much essential for the
networked system. I have clearly described about all the networking devices with their operating
principles and various server types. Proper connection of the network device with their proper use
can be very much beneficial for the system.
Task 5 [P4]
Discuss the interdependence of workstation hardware with relevant networking software.
Introduction:
‘Network infrastructure is the hardware and software resources of an entire network that enable
network connectivity, communication, operations and management of an enterprise
network.’[ CITATION Tec182 \l 1033 ] Network infrastructure is very much essential in the field of
networking. It comprises of hardware and software components. Hardware and software components
are essential parts in the computer networks. Hardware is the physical aspects whereas software is
the components because of which the computer or device functions.
In this task, I have discussed about different computer hardware that are needed to be installed in the
server and illustrated about the interdependence of the workstation hardware with networking
software.
Hardware Requirements:
Hardware is very much essential part in forming the network and the hardware should also be of the
best quality. Some of the hardware requirements needed to be installed in server are:
For Server:
Components Requirements
2. Memory 8 GB RAM
3. Hard Disk 1 TB
8. Monitor 19 LCD/LED
For Client:
Components Requirements
2. Memory 4-8 GB
3. Hard disk 1 TB
4. Switches Ethernet
5. Monitor LCD/LED
Software Requirements:
‘Network software is an extremely broad term for a range of software aimed at the design and
implementation of modern networks. Various types of network software support the creation,
calibration and operation of networks.’[ CITATION Tec182 \l 1033 ] Software is another important
part as like hardware for the formation of the networked system. It is from what the overall system
operates and the network software is the basic element for any network. It helps the administrator
administer or look after or manage the network. The internet, which is the worldwide connection, is
relying upon networking software. The networked system of Nepal Bank Limited requires various
kinds of software like MY SQL, which is the database software, Google chrome as the web browser,
different Microsoft package software, financial software etc., are also much essential necessary for
the networked system.
The clients of the Nepal Bank Limited are using Windows 10 as their Operating System which
simply supports all the basic software like Microsoft Office, Banking and financially required
software, etc. The server computer use Windows Server 2016 as the Operating System where a
domain controller is configured and it administers all the clients in the network. There were different
firewalls software in both the server and the client in a network for the protection from threats.
Conclusion:
In summary, for the flawless running of the networked system, it is very much essential to have the
required hardware for the software and the relevant networking software. The proper functioning of
the system is all due to the proper synchronization between the hardware and software. Both the
hardware and software must be of good quality for the better productivity in the system. So, the
earlier depicted hardware requirements and the networking software must be established in the head
and the branch office to form an effective networked system.
Task 8 [P5]
Design a networked system to meet a given specification.
Introduction:
‘A network is a collection of computers, servers, mainframes, network devices, peripherals, or other
devices connected to one another to allow the sharing of data. An excellent example of a network is
the Internet, which connects millions of people all over the world.’[ CITATION Com17 \l 1033 ] We
can simply say that a network is where all the devices or computers or technologies are linked
together in order to communicate. Design is basically a model. Designing a network is needed before
the implementation of network infrastructures. Network design is a plan for the execution of
computer network infrastructures and basically a blueprint for executing network physically.
In my task, I have created or designed a networked system to meet a given specification considering
server technology, network components and network devices.
An IP address, or simply an IP, is a unique address that identifies a device on the Internet or a local
network. It allows a system to be recognized by other systems connected via the Internet protocol.
[ CITATION Tec16 \l 1033 ] IP address is numerical value given to all the devices, which are
connected to the network. Below, I have depicted IP addresses assigned to the servers during network
design:
Domain Controller (DC): ‘A domain controller (DC) is a server that handles all the security
requests from other computers and servers within the Windows Server domain. Security
requests include requests to log in to another server.’[ CITATION Com18 \l 1033 ]
Moreover, we can say that domain controller is the main server computer, which controls all
the activities within the domain like security authentications etc.
Domain Name System (DNS):
‘Domain name system (DNS) is a hierarchical naming system built on a distributed database.
This system transforms domain names to IP addresses and makes it possible to assign domain
names to groups of Internet resources and users, regardless of the entities' physical location.’[
CITATION Tec18 \l 1033 ] DNS can be considered as Internet phone book as it transforms
hostnames to IP because of which it is easier to assign and give the domain names.
Dynamic Host Configuration Protocol (DHCP):
DHCP is a network control protocol that automatically offers an IP host with its IP address
and other different configuration information together with the subnet masks and default
gateway. DHCP allows both manual IP address assignment and automatic assignment.
Windows Deployment Service (WDS):
It is a server technology which provides the administrators the ability or facilities to deploy
windows OS remotely.
Read Only Domain Controller (RODC):
A read-only domain controller (RODC) is a server that hosts an Active Directory database's
read-only partitions and responds to security authentication requests.[ CITATION Mar16 \l
1033 ] RODC provides a definition by its name which is it has a read only copy of database
of active directory and it also enhances and provides the security for DC.
Virtual Private Network(VPN):
‘A virtual private network (VPN) is a technology that creates a safe and encrypted connection
over a less secure network, such as the internet.’[ CITATION Tec181 \l 1033 ] VPN is mainly
used in order to allow the remote users to access the resources as the data travels through
tunnel safely.
Secondary DNS:
Secondary DNS can be basically termed as the backup in case the down nature of primary
DNS and it can be used to balance even if the DNS is down, sever would be up and exchange
of information is possible.
Router:
Sujan Gautam (HND / First Semester)
24
Networking 2018
Router is simply the networking device, which has the function or work to forward data
packets or the information from one network to another performing the traffic directing or
reducing action.
Switch:
‘A network switch is a small hardware device that centralizes communications among
multiple connected devices in one local area network (LAN).’[ CITATION Bra18 \l 1033 ] A
switch can be used to connect individual computers or different devices to bring together in a
network for sharing files
Printer:
A printer is an external networking device or the output devices, which functions to print the
data or information in hardcopy. It is very useful device.
Access Point:
Access Point is a networking device that acts as a station for data receiving and transmission
and also provides the opportunity for Wi-Fi devices to connect to a wired network.
Firewall:
Firewall can be termed or defined as the windows or network security system that inhibits the
foreign access to the private networks. It also functions as traffic directing or barrier for the
errors reaching to the files.
Users:
A user is a person or individual that uses or operates computer or network service by not
needing of technical expertise.
Groups;
A group can be known as grouping of users or the user accounts that usually share the same
security rights as well as the permissions. Access control is the main use of group.
Organizational Units:
Organizational unit can be termed as container or the subdivision within a Active directory
which can hold or we can keep users, groups and other OU’s also.
Membership:
Membership can be considered as the main or the most important factor because it is
responsible for accessing files, folders and other data’s as without the membership of the
domain we can’t get access to the environment of Active directory.
Group Policy:
Group Policy can be termed as hierarchical feature that controls the working environment or
configuration part for user accounts or computers.
Conclusion:
Here, I have designed a networked system and also described the network components and sever
technology included in designing. The design works as a blueprint or it shows how network is
established. As network design is necessary before implementation of network infrastructure, the
design above clearly depicts the connection of network components and devices to form an overall
network of a bank.
Task 9 [P6]
Test and evaluate the design to meet the requirements and analyze user feedback.
Introduction:
Testing is the process of analyzing the report and getting known about the flaws. It has very much
significance for getting across about the problems. After all the work or assignment has been
completed then we look for the testing to analyze the result. Testing is of various types and is the
verification or judgment of the work. While testing we evaluate the result, so the evaluation and
analyzing comes under test operation.
In this task, I firstly prepared the test log of the proposed design considering the expected and the
actual output. I have also collected the user feedback for my design and carried out the analyzing
processes.
Test Log:
So, below I have given the test log, which is carried out for the effectiveness of the design of the
networked system.
4. Print Server Member client should get Client which is Clients requirement
access to the shared printer member can with the print server
Reliability: The networked system must be reliable. ‘Administrators have to make sure that
at any given time the network is capable of delivering packets to their destinations in a timely
fashion with an acceptable delay and jitter profile.’ [ CITATION Wae08 \l 1033 ] In my
design, I have focused on how I can make my networked system very reliable. The common
problem in every networked system can be traffic. Therefore, keeping in mind about the
traffic I have made the network design, which will run smoothly. The design is made
according to the client’s requirement, so that the networked system will be reliable and
reduce the future problems.
Scalability:
The networked system needs to add technology or devices in the near future for the better
productivity. Scalability means to provide a way to include or extend the system for the better
improvement. Every networked system should be capable to extend and make the system
more advanced. Knowing the importance of scalability, I have made the design, which is able
to adapt to growth, and business scalability needs without needing the system to make drastic
change.
Bandwidth:
It is another factor to be considered for the efficient running of the networked system.
Networked system must be fast and bandwidth is the key aspect for determining speed.
‘Bandwidth is the amount of data that passes through a network connection over time as
measured in bits per second (bps).’ [ CITATION Bra18 \l 1033 ] It depicts the overall or total
capacity of the connection of the system and higher the capacity, higher the performance of
the networked system. The networked system has enough bandwidth and the system will
operate or run faster and smoother.
Security and Troubleshooting:
Security and Troubleshooting can be considered the factor for evaluating how efficient the
network system is and if it can give the proper advantages. In the design process, I had
thought about the hackers or the attackers, which can be a threat. So, the networked system is
designed in such a way that it would be as difficult for them to disturb. The troubleshooting is
also considered. It should be easy to detect and troubleshoot the flaws. Hence, security and
troubleshooting evaluates the networked system.
Date:
Project Description: The project is to plan, manage, design and implement the networked system for
the Nepal Bank Limited. As the branch to communicate, now because of the new design is using the
work group based network, the computer would be domain based where one server governs all other
clients and manages all other resources.
Important Features The main feature is that the networked system is domain based. Being
of the Project domain based, the centralization policy has been applied. All the clients are
connected to the domain and domain manages all the other resources
required for the client computers. The other important servers like DHCP,
RODC, CDC, Print, VPN, etc. has been inculcated which greatly enhance
the networked system. Strong firewalls has also been configured which
addresses the security issues.
The front end and the back end of the system have been
designed.
Sujan Gautam (HND / First Semester)
29
Networking 2018
Significance of the Project The main significance is domain based brought by the domain based
network. Being in this type of network, it is very much easier for the
client as well as the administrator. There is centralized user
management. One administrator looks after the domain its users and
resources. There is no need to make changes throughout the computer,
as the changes made in the one computer will change all others. The
server roles like RODC, CDC, VPN, Print, DHCP etc. have been
configured which brings many features and it makes easy for the
clients and the administrator. All these servers operate to make the
system reliable, effective and efficient.
Limitation of the Project We can get many significances from this networked system and yet
some of the limitations are in existence. There is no availability of
Secondary DNS. The system does not operate properly as it should
have due to improper separation of DNS server. The cloud computing
has to be established for securing as it enables data recovery and
backup.
Feedback Evaluation
Feedback Evaluated by: Sujan Gautam Signature:
Date:
Evaluation of the System:
According to the feedback, there are some good aspects and some of the limitations as well which
needs to be addressed as soon as possible. There is a lack of secondary DNS, which is needed
because it offers security through redundancy and it functions to moderate the resource load on
primary DNS. The cloud computing system must also be introduced to protect backup and recovery
data. There should also be the enhancement of the VPN server.
Conclusion:
In summary, the design was properly tested and evaluated in order to meet the client requirements.
While testing we evaluate the result, so the evaluation and analyzing comes under test operation.
Taking feedback proved to be very beneficial, as it led me to find the limitations of the design and
work for its betterment. The feedbacks were properly analyzed and the recommendations for the
future consideration are given.
Task 13 [P8]
Document and analyze test results against expected result.
Introduction:
Testing is the process of analyzing the report and being known about the flaws. It has very much
significance for getting across about the problems. After all the work or assignment has been
completed then we look for the testing to analyze the result. Testing is of various types and is the
verification or judgment of the work.
In this task, I have provided a document and illustrated how I analyzed the actual test results against
the expected outcomes.
Analysis:
There is given a reply from the client, which shows the proper network connection.
Therefore, it is the network connectivity testing.
Analysis:
There is an effective and clear result of the domain testing as domain name is seen at the start
of the system
3. Membership testing:
Analysis:
There is an effective, positive and clear result of the test of the membership as domain name
as sign in request is clearly observed.
4. Test of RODC
Analysis:
There is effective, positive and clear result of the RODC testing as OU created can be clearly
observed at the other server.
Analysis:
There is effective, positive and clear result of the testing of CDC as child domain is observed
just before the main domain
6. Print Server
Analysis:
There is effective, positive and clear result of the testing of print server as the client gets
access to the printer.
7. VPN
Analysis:
There is effective, positive and clear result of the testing of VPN and now the user can get
access to the private network from the public network.
Conclusion:
The above document clearly shows the test, which was carried out. All those test shows positive
results, which clearly illustrate the establishment of the networked system without the flaws and
errors. The report shows the test date, test number, what was tested, Expected output and Actual
output which assures or ensures successful implementation or execution and diagnosis of the
networked system.
Task 3 [M1]
Compare common networking principles and how protocols enable the effectiveness of
networked systems.
Introduction:
Network can be defined as the group of computers or devices connected in order to share the
information and networking principles are the format or pattern, which shows how various
networking devices communication is established in a network. ‘A protocol is a set of rules and
guidelines for communicating data. Networks have to follow these rules to successfully transmit
data.’ [ CITATION tec06 \l 1033 ] The protocols are very much needed for maintaining the
effectiveness of the networked system and it states the standards for data communication and
transmission providing enough information on the method involved.
In this task, I have discussed about the networking principles of OSI layer or model and provided a
document on how the different protocol enables the effectiveness of the networked system.
‘The electrical and procedural parameters of the physical connection between the network
subscribers are defined in the physical layer.’ [ CITATION Spr14 \l 1033 ] It is basically
based on transmitting raw bits over the communication medium. Physical layers include
various devices like Ethernet, token-rings.
The Data-Link Layer:
‘The main task of the data link layer is to transform a raw transmission facility into a line that
appears free of undetected transmission errors to the network layer.’[ CITATION And03 \l
1033 ] Data link layer being most complex so, it is divided into two parts which are Media
Access Control and Logical Link Control as sub layers. Media access control deals with the
issue of controlling access to the shared medium.
The Network Layer:
It has the work to control the functioning of the subnet and routing is also the added features
in terms of network layer .i.e. it supports routing. This layer as well acts as a medium for the
data transmission between the nodes. In this layer, routing problem is simple in terms of
broadcasting so, layer is thin.
The Transport Layer:
‘The function of this layer is to accept the data from above, split it up into smaller units if
need be, pass these to the network layer, and ensure that the pieces all arrive correctly at the
other end.’[ CITATION And03 \l 1033 ] The transport layer also functions to verify the flaws
in the data it receives. The common transport layer examples are User Datagram Protocol and
Transmission Control Protocol.
The Session Layer:
Due to session layer, users who are in different machine have the opportunity to form
sessions among them. Session provides various services like keeping the records about whose
work it is to broadcast data, managing tokens, continuing the connection from where there is
interruption (synchronization) etc.
The Presentation Layer:
‘It is concerned with the syntax and semantics of the information transmitted.’[ CITATION
And03 \l 1033 ] It is one of the simplest and as well in the function in terms of OSI layer. One
principle of presentation layer is that it manages the abstract data structures and translates the
data from one presentation layout to another.
The Application Layer:
‘The Application layer supplies network services to end-user applications. Network services
are typically protocols that work with user's data.’[ CITATION Bra182 \l 1033 ] This layer
mainly has protocols like HTTP (Hyper Text Transfer Protocol) as it is needed by the user.
Some other services like file transfer, electronic mail are also provided in this layer.
Network Protocols:
The protocols are very much needed for maintaining the effectiveness of the networked system.
Some of the protocols with its necessity are discussed below:
TCP/IP:
TCP stands for Transmission Control Protocol and IP stands Internet Protocol. Both have
their respective functions. ‘TCP defines how applications can create channels of
communication across a network.’[ CITATION Mar17 \l 1033 ] It encapsulates the data in
the form of packets and sends it to the destination. TCP deals with the connection between
the two clients and exchange of information. It is the only reason for the internet’s existence.
IP stands for Internet Protocol and a process by which transmission of data takes place.
‘TCP/IP is highly scalable and, as a routable protocol, can determine the most efficient path
through the network.’[ CITATION Mar17 \l 1033 ] TCP/IP is a very important in terms of
internet and it is nonproprietary. Its significance cannot be underestimated and it’s very much
important for the establishment of the networked system.
DHCP:
DHCP is a network control protocol that automatically offers an IP host with its IP address
and other different configuration information together with the subnet masks and default
gateway. DHCP allows both manual IP address assignment and automatic assignment.
Without DHCP, IP addresses must be configured manually for new computers or computer
systems which might be moved from one subnet to some other, and manually reclaimed
for computer systems that are disconnected from the network. DHCP enables this entire
operation to be automatic and controlled centrally. Hence, DHCP is very much necessary for
the networked system.
HTTP:
HTTP stands for Hyper Text Transfer Protocol. ‘HTTP is the underlying protocol used by
the World Wide Web and this protocol defines how messages are formatted and transmitted,
and what actions Web servers and browsers should take in response to various
commands.’[ CITATION Van182 \l 1033 ] It is simply used for accessing and creating the
web pages. The help of HTTP has developed every web page
UDP:
UDP stands for User Datagram Protocol. It is connectionless and very much important in the
field of client-server part. Basically, it has a merit of sending the small data grams without
having the establishment of the connection.
FTP:
FTP stands for File Transfer Protocol and the function is basically as by its name. It helps or
operates to transfer files from a client to server in a networked system. So, it is another
important protocol which is very much effective and needed for the networked system.
SMTP:
SMTP stands for Simple Mail Transfer Protocol. Generally, we send emails and the emails
sent by the email system use SMTP, so, it is one of the factor for maintain the connections.
DNS:
‘Domain name system (DNS) is a hierarchical naming system built on a distributed database.
This system transforms domain names to IP addresses and makes it possible to assign domain
names to groups of Internet resources and users, regardless of the entities' physical location.’[
CITATION Tec18 \l 1033 ] DNS can be considered as Internet phone book as it transforms
hostnames to IP because of which it is easier to assign and give the domain names as a result
it is another factor for establishing networked system.
Conclusion:
In summary, we can say that the various layers of OSI have their own respective importance and
each has their own operating principles and greatly helps in the establishment of the network.
Though the networking principles of the layers present in OSI are different, all the layers play their
significant role for forming the network system. The network protocols are also of many types and
they are essential part as it enables the effectiveness of the networked system in many ways.
Task 6 [M2]
Explore a range of server types and justify the selection of a server, considering a given
scenario regarding cost and performance optimization.
Introduction:
‘In a technical sense, a server is an instance of a computer program that accepts and responds to
requests made by another program, known as a client’. [ CITATION Com18 \l 1033 ]Typically any
device that operates server software or programs could be considered a server as well. In a network,
the connection is all related to the client and the server. So, a server has a very important role to play
in a networked system. Firstly, a server must be selected to effectively form a networked system and
a server selection must meet all the requirements of the networked system of the company.
In this task, I firstly made an exploration of the servers and selected the appropriate server regarding
cost and performance optimization. A proper server selection will be very fruitful and will meet all
the objectives of the Nepal Bank Networked System.
Range of Server:
After a wide exploration, three types of server were found before selecting the appropriate one for
the networked system. They were:
Selection of Server:
All three servers above written have merits and demerits. Keeping in mind which server can be
effective, HPE ProLiant BL460 Gen10 Blade Server was selected for smooth performance of the
Nepal Bank. Selection was done considering cost, performance, and other various useful
characteristics.
like hardware, it makes possible to identify and solve. Thinner look and infrastructure of this
server makes the work effortless.
Density and Utility Savings:
‘One can fit a greater number of servers per rack than traditional rack servers, so you save on
space.’[ CITATION Col18 \l 1033 ] It means it has high density, a higher number of servers
can be adjusted, and they save the space. When this server is used in the networked system,
then it uses less power and hence improves power management. It takes relatively less space,
power per storage unit.
SN Devices Price
.
1. Server RS. 1,68,000
2. Switch 10/150 RS. 14,000
3. Router (manageable) RS. 13,00
Conclusion:
Consequently, server is the first and foremost need in order to be in network or to establish a
networked system. It was very much essential to select an appropriate one for the Nepal Bank
Networked System, so, HPE ProLiant BL460 Gen10 Blade Server was considered the appropriate
one as its features meets all the requirements of the system. Hence, for the productive and efficient
running of the system, appropriate server is the basic keystone for any company.
Task 14 [M4]
Recommend potential enhancement of the networked systems.
Introduction:
Basically, a networked system provides or gives the information about all the network components,
devices and how they are connected to each other for sharing of information. It is quite necessary or
important to properly maintain and govern the system for the efficient running of the system. The
networked system was designed addressing all the problems and meeting the client requirements. As
the Nepal Bank needs a high quality networked system, domain based network is of vital importance.
The high quality network components and devices are set up which in present and in the near future
helps in smooth, efficient and effective running of the networked system.
In this task, I have given description about the enhancement in network hardware and software
needed for the betterment and to make the network system more flexible.
Private Network (VPN), etc. has been inculcated in the design, which greatly enhances the
networked system. Strong firewalls has also been used which addresses the security issues.
As the network design is domain based, it brings a lot of positive impacts or significance itself. The
main significance is domain based brought by the domain based network. Being in this type of
network, it is very much easier for the client as well as the administrator. In old network design,
whenever the system needs change, every computer must change individually where in new network
design there is no need to make changes throughout the computer as the changes made in the one
computer will change all others. The server roles have been configured which brings many features
and it makes easy for the clients and the administrator. RODC and CDC functions even if the
primary domain gets down. Due to VPN the branch, office is connected to the head office and head
office can get access to the information and resources. DHCP helps to dynamically assign the IP
address to all the clients and it would be far easy for the clients to operate. Hence, all these servers
operate to make the system reliable, effective and efficient.
Consequently, the new design view is far better and brings a lot new features than the old design,
which makes the networked system to run flawlessly.
Hardware components:
Hardware is very much essential part in forming the network. The hardware components
include various devices, peripheral nodes, switched, routers etc. There are various network
devices used in the networked system and not all of them are of the best quality. If the
hardware devices are used of the best quality, then it will definitely enhance the networked
system. The routers and switches of Cisco can be used for reliability and flexibility in
network performance. In the same way, access point of Cisco can be used in data receiving
and transmission. The firewalls of juniper, Fortinet can be used to enhance the security of the
networked system, which ultimately helps to foster the overall networked system. Similarly,
the printers of Canon, Brother can be used. Hence, using all the top quality devices the
overall networked system will be very much proficient.
Cloud Computing:
Nepal Bank generally saves the important information by using data centers. There is no
availability of Cloud computing. So, cloud can be used in case of data centers for storing
data. The main feature of cloud computing is that is very fast and lets immediate interaction.
For the customers as well, it makes easier and simpler to get access to the resources and
information and as a result it greatly enhances the networked system.
Recommendation:
The infrastructures or device of the networked system when enhanced seems operate much quicker
and hence benefits the Bank by increasing the overall productivity. Some of the reasons for the
enhancement of the infrastructures of the networked system are discussed below:
So, there are many positive impacts coming from the potential enhancement of the infrastructure of
the networked system but ultimately it requires a huge budget. It requires much money for
maintaining and upgrading the devices and once the infrastructures are enhanced, various advantages
can be taken and will help to increase the efficiency of Nepal Bank.
Conclusion:
In summary, it can be said that potential enhancement of the various devices of the system will
eventually enhance the networked system. Various benefits can be withdrawn from it. It increases the
overall performance of the network and hence makes the security system strong. The enhancement of
the networked system will increase the productivity of the Nepal Bank Limited.
Task 7 [D1]
Considering a given scenario, identify the given topology protocol selected for the efficient
utilization of a networked system.
Introduction:
‘A network topology describes the arrangement of computer network. It defines how the workstation,
or nodes, within the network are arranged and connected to each other.’[ CITATION UKE13 \l
1033 ] So, it is the design of a network and how different nodes in a network are associated to each
other and how they correspond is determined by the network's topology. Basically, there are six kinds
of topologies like bus topology, star topology, ring topology, tree topology, mesh topology and
hybrid topology. All the topologies have their own advantages and disadvantages and it is very much
essential to select an appropriate topology for the networked system. Selection of topology should be
done on the basis of reliability, scalability, advantages of that topology, number of users to be served
by that topology, easy installation and ease of access.
Realizing the necessity of the topology, I have selected star topology and maximum benefits can be
taken from it. In this task, I have explained why I have chosen star topology for the network system
with the benefits and some recommendations.
Selection of topology should be done based on reliability, scalability, advantages of that topology,
number of users to be served by that topology, easy installation and ease of access. I have selected
star topology and maximum benefits can be taken from it. It is the type of topology where all the
nodes are connected to a central device or element called hub or switch. ‘In the star topology, one
central node or server workstation to which each of the other nodes on a network are directly
connected.’[ CITATION UKE13 \l 1033 ] The central device or hub works as a junction to connect
all the nodes in the star network and UTP. Ethernet cable is used to connect to the central node. It is
the most preferable model as it has many advantages and can be easily installed.
Star topology can be taken as the appropriate one for the efficient utilization of the networked
system. Some of the benefits of star topology is listed below which makes it selective one.
Simplicity:
Simplicity means becoming simple and easy to understand. Star topology is simple and it is
easy for the learners to know about the star topology. ‘The topology is easy to understand,
establish, and navigate. The simple topology obviates the need for complex routing or
message passing protocols. Due to its centralized nature, the topology offers simplicity of
operation.’[ CITATION UKE13 \l 1033 ] It is easy to operate and connections as well. It is
very much easier to maintain this network, so is popular.
Reliability:
Reliability means working consistently without disruption. ‘Single computer failure will not
disturb whole network, since all other computers are connected with separate links (wires) to
HUB. Definitely, they will work fine. Therefore, only the faulty computer will not be able to
communicate with other computers in the Local Area Network.’[ CITATION Per12 \l 1033 ]
Failure of one computer notes doesn’t affect the whole network. That means, data
communication and receiving signals is still possible.
Better Performance:
Being in a star topology, data passing is minimized through excessive number of nodes. ‘At
most 3 devices and 2 links are involved in any communication between any two devices
which are part of this topology.’[ CITATION UKE13 \l 1033 ] In star topology, data packets
are sent very quickly without unnecessary transmission of data. High speed is the main
feature of star topology, so it gives better performance.
Centralization:
‘The star topologies ease the chance of a network failure by linking all of the computers to a
central node. All computers may therefore communicate with all others by transmitting to and
Sujan Gautam (HND / First Semester)
50
Networking 2018
receiving from the central node only.’ [ CITATION UKE13 \l 1033 ] It means all the activities
depend upon the central hub because of which the system is called centralized. Traffic
controlling and maintaining good network connection can be all due to centralized nature of
star topology.
Easy Troubleshooting:
It is very much easier to troubleshoot the problem when we are in a network of star topology.
As we all know how complex is the structure of Hybrid and Mesh topology and we don’t find
star topology that much complex because of which the troubleshooting is far easier.
Moreover, when we are in star topology, failure of one cable never affects in the data and
network communication. As all the nodes depend on the hub and not the cable, it is relatively
easier to find and solve the problems.
Recommendation:
As, we have discussed about the importance and benefits star topology has over the other network
topology, still there are some drawbacks or the negative impacts which should be addressed. The cost
of cabling and the hub which is needed in a star topology is very high; everything is dependent upon
the hub and if the hub fails then the system collapses. These are the minor flaws, we can have when
we are in star topology but we can have it only in longer run. Therefore, among the different
topologies, we can find star topology far beneficial and with less flaws. Nowadays, we can find star
topologies in homes and offices very much due to its easy and advantageous nature. Therefore, we
can keep aside the minimum disadvantages that we get from star topology and maximum spotlight
must be given up for its installation.
Conclusion:
To sum up, we can say that star topology has huge advantages. Networked system would be very
much efficient due to the effective nature of star topology. Maximum requirements can effectively be
met by the star topology and for effective working of star topology, focus should be given to hub to
make it best as all the nodes or the computers depend upon the hub. Star topology can be the best
choice for the networked system mainly due to its minimum flaws and addressing the problem of hub
which is heart of the topology.
Task 11 [D2]
Design a maintenance schedule to support the networked system.
Introduction:
Network maintenance is very much essential as it keeps up the network and the networked system
can run in an efficient way. It is necessary for the networked system to be checked routinely by the
administrator. Network maintenance generally ensures reliability of the system enhance the
productivity of the company. In order to go for network maintenance, you must have a plan for it. It
is necessary to make a detail schedule which is basically called maintenance schedule.
In this task, I have designed a maintenance schedule of 3 days for the networked system of the Nepal
Bank Limited. While designing I considered backups, upgrades, security and auditing as the main
areas. I have also provided justification about the maintenance tasks.
Maintenance Schedule:
Date Time Maintenance Tasks
TEA BREAK
TEA BREAK
TEA BREAK
The table in the above shows the various network maintenance tasks carried out for 3 days for the
betterment of the networked system. Maintenance task included server maintenance, backup and
security checks, etc. They are briefly discussed below:
DAY 1:
The description of the maintenance task scheduled for the first day is given below:
DAY 2:
The description of the maintenance task scheduled for the second day is given below:
potential issues.’[ CITATION How18 \l 1033 ] Proper plan should be made for the network
upgrades which is very much necessary and extensions also should be thought in the network
maintenance task
Patching Server:
‘Depending on the server roles, various patches are applied, critical updates were updated and
suitable window was confirmed with the client, check backups, apply critical patches, reboot,
and test server functions’[ CITATION Fir16 \l 1033 ]. It very much necessary to do patching
of server and it also comes under the maintenance task that was scheduled for second day.
Antivirus installation and securing network from threats:
The basic and the integral part of network maintenance is the network security. The
networked system must be away from all the internal and external threats. So, the security of
the network was reviewed and checked if it needed any maintenance before any of the threats
occur.
Ensuring compliance with legal regulations:
‘A structured network maintenance methodology also ensures that the network is compliant
with both legal obligations and policies.’[ CITATION How18 \l 1033 ] The networked system
is ensured with the legal regulation in order to help the network to form a reliable and
functioning one. Effective networked system can be made by checking if the system is
ensured.
DAY 3:
The description of the maintenance task scheduled for the third day is given below:
Database Maintenance:
Database server is an important part in a company. They should be monitored and reviewed
time to time if they were properly functioning. The database servers like SQL server, oracle
must be reviewed and running process must be checked.
Firewalls and security audits:
It is very much essential to protect the networked system from threats. In order to protect the
system, the firewalls must be audited or checked if it functions effectively or not. It is very
much essential to check the security system in the context of networked system.
Troubleshooting problems:
Troubleshooting some of the arise problems is one of the important maintenance task. The
problems must be resolved as soon as possible for the system to function and work in a
smooth way. So, significant time must be given for troubleshooting the aroused problems.
Review backup scope and retention:
Backup is the routine and regular maintenance task. Backup is very important for the
networked system. The core network components and devices are verified ensured backed up.
The verification of the data retention policy was done and for backing up data, pre-defined
retention schedule was adhered.
Conclusion:
In summary, the three days maintenance task has been clearly defined and explained the importance
of each of the task. Fundamentally, the network maintenance is very much essential to keep up the
networked system. Routine maintenance must be done of the networked system for it to run properly
and efficiently. Thus, for anyone’s system to work in an effective way with no any technical issues,
the above scheduled maintenance task should be properly and routinely completed.
Task 15 [D3]
Use critical reflection to evaluate own work and justify valid conclusions.
Introduction:
Basically, a networked system provides or gives the information about all the network components,
devices and how they are connected to each other for sharing of information. It is quite necessary or
important to properly maintain and govern the system for the efficient running of the system. As the
Nepal Bank needs a high quality networked system, domain based network is of vital importance.
The high quality network components and devices are set up which in present and in the near future
helps in smooth, efficient and effective running of the networked system. The networked system was
designed addressing all the problems in the old design and meeting the client requirements.
In this task, I have evaluated or reviewed the network design, test plans of the proposed design and
diagnosed the implemented network. I have also given the positive and negative aspects or factors
including the recommendation for the networked system.
Network Design:
There were various problems or flaws while using the old design or old networked system. The new
design was created with a view or aim to remove all the flaws of the old system and the system could
run effectively. The network design is based on client-server .i.e. domain based. Being domain based,
the centralization policy has been applied. All the clients are connected to the domain and domain
manages all the other resources required for the client computers. There is one administrator who
handles the domain and the domain handles all other users in the system. It also approves the security
requests. The other important servers like Dynamic Host Configuration Protocol (DHCP), Read Only
Domain Controller (RODC), Child Domain Controller (CDC), Print, Virtual Private Network (VPN),
etc. has been inculcated in the design, which greatly enhances the networked system. Strong
firewalls has also been used which addresses the security issues.
change all others. The server roles like Read Only Domain Controller (RODC), Child Domain
Controller (CDC), Virtual Private Network (VPN), Print, Dynamic Host Configuration Protocol etc.
have been configured which brings many features and it makes easy for the clients and the
administrator. RODC and CDC functions even if the primary domain gets down. Due to VPN the
branch, office is connected to the head office and head office can get access to the information and
resources. DHCP helps to dynamically assign the IP address to all the clients and it would be far easy
for the clients to operate. Hence, all these servers operate to make the system reliable, effective and
efficient.
Network Topology:
Selection of topology should be done on the basis of reliability, scalability, advantages of that
topology, number of users to be served by that topology, easy installation and ease of access. I have
selected star topology and maximum benefits can be taken from it. In the networked system, star
topology has been used for connection of various nodes and configuration of routers, switches and
other devices has been done according to star topology.
As there are many branches of Nepal bank, the same-networked system cannot meet all the
requirements in the near future. There is only primary DNS and it cannot alone handle all the work in
near future and will result to the failure of the network. There is no availability of Secondary DNS.
The secondary DNS is required because it offers security through redundancy and it functions to
moderate the resource load on primary DNS. The system does not operate properly as it should have
due to improper separation of DNS server. The cloud computing has to be established for securing as
it enables data recovery and backup. The cloud offers unlimited storage for storing data, which will
be very vital. There should also be the enhancement of the VPN server .i.e. practically should be
configured, as many users cannot be habituated with VPN services. Security issues have to be fully
emphasized. If we look after some of the flaws and reduce it, then it would be the best for the Nepal
Bank Limited and it would greatly increase the productivity. The system can get much better in
future as there is the opportunity of the scalability and we can add extra features to the system.
Looking after the security, reliable and scalable nature of this networked system; it will run very
smoothly and will be productive for the Nepal Bank Limited.
Conclusion:
In summary, the overall network design was evaluated and tested to meet the client’s requirement.
The networked design was properly implemented and diagnosis was done which all showed that the
networked system functions well. The positive and negative aspects were identified and proper
solutions were given to the issues. Therefore, after auditing security, reliable and scalable nature of
this networked system; it will run very smoothly and will be productive for the Nepal Bank Limited.
Bibliography
maintenance/
[Accessed 6 april 2018].
Tanenbaum, A. S., 2003. Computer Networks. Fourth ed. India: Dorling Kinddersley Pvt.Ltd.