ASSIGNMENTnetw
ASSIGNMENTnetw
ASSIGNMENTnetw
STUDENT DETAILS
1
Networking Assignment | first semester
UNIT DETAILS
Plagiarism
Plagiarism is a particular form of cheating. Plagiarism must be avoided at all costs and students who break the rules,
however innocently, may be penalized. It is your responsibility to ensure that you understand correct referencing
SAJAN THAPA | SECTION A
2
Networking Assignment | first semester
practices. As a university level student, you are expected to use appropriate references throughout and keep carefully
detailed notes of all your sources of materials for material you have used in your work, including any material
downloaded from the Internet. Please consult the relevant unit lecturer or your course tutor if you need any further
advice.
Student Declaration
I certify that the assignment submission is entirely my own work and I fully understand
the consequences of plagiarism. I understand that making a false declaration is a form of
malpractice.
3
Networking Assignment | first semester
Your manager has given you the task of preparing a report on the concepts related to networking principles
and topology, devices and their operating principles and proposing a topology that will be suitable for the
scenario. You will need to include some elements of theory:
1. A discussion of the various benefits and constraints relating to different network types and standards. 2.
An explanation of the impact different network topologies have on communication and bandwidth
requirements. You could also include a brief comparison of common networking principles and explain
how protocols enable the effectiveness of networked systems. You also need to explore the various
networking devices and their operating principles.
● You will need to produce a discussion of the operating principles of the main networking devices and
server types and relate this to the interdependence of workstation hardware to the appropriate networking
software.
4
Networking Assignment | first semester
Executive summary....................................................................................................................... 16
Scope ............................................................................................................................................. 16
Objective ....................................................................................................................................... 17
Introduction ................................................................................................................................... 18
Cloud computing........................................................................................................................... 29
5
Networking Assignment | first semester
star topology................................................................................................................................................ 43
Ring topology.............................................................................................................................................. 44
6
Networking Assignment | first semester
Shielded twisted pair ........................................................................................................................... 51
Coaxial cable............................................................................................................................................... 51
Microwaves:................................................................................................................................................ 55
Infrared........................................................................................................................................................ 57
Requirement ................................................................................................................................................ 60
Router.......................................................................................................................................................... 61
Switch ......................................................................................................................................................... 62
Repeater ...................................................................................................................................................... 63
Modem .......................................................................................................................................... 64
Hub.............................................................................................................................................................. 64
Workstation ................................................................................................................................................. 66
Server ............................................................................................................................................ 66
7
Networking Assignment | first semester
Rack server.................................................................................................................................................. 68
Logical server................................................................................................................................ 71
File server............................................................................................................................................ 71
Conclusion .................................................................................................................................... 76
Physical design.............................................................................................................................. 78
Install and configure network services and applications on your choice. ..................................... 80
SAJAN THAPA | SECTION A
8
Networking Assignment | first semester
Test and evaluate the design to meet the requirements and analyze user feedback with the aim of
improving efficiency. .................................................................................................................... 97
Recommendation for potential enhancement for the network system ........................................ 113
Document and analyze test results against expected results. ...................................................... 115
9
Networking Assignment | first semester
Use critical reflection to evaluate own work and justify valid conclusions. .............................. 128
10
Networking Assignment | first semester
11
Networking Assignment | first semester
Submitted by:
Submitted to:
Sajan Thapa
Manager, NIC Asia bank
IT officer, NIC Asia bank ltd Kathmandu
Executive summary....................................................................................................................... 16
Scope ............................................................................................................................................. 16
Objective ....................................................................................................................................... 17
Introduction ................................................................................................................................... 18
12
Networking Assignment | first semester
Cloud computing........................................................................................................................... 29
star topology................................................................................................................................................ 43
Ring topology.............................................................................................................................................. 44
13
Networking Assignment | first semester
Hybrid topology .......................................................................................................................................... 47
Coaxial cable............................................................................................................................................... 51
Microwaves:................................................................................................................................................ 55
Infrared........................................................................................................................................................ 57
Requirement ................................................................................................................................................ 60
Router.......................................................................................................................................................... 61
Switch ......................................................................................................................................................... 62
Repeater ...................................................................................................................................................... 63
Modem .......................................................................................................................................... 64
SAJAN THAPA | SECTION A
14
Networking Assignment | first semester
Hub.............................................................................................................................................................. 64
Workstation ................................................................................................................................................. 66
Server ............................................................................................................................................ 66
Rack server.................................................................................................................................................. 68
Logical server................................................................................................................................ 71
File server............................................................................................................................................ 71
Conclusion .................................................................................................................................... 76
15
Networking Assignment | first semester
Executive summary
The Following report is intended for the NIC Asia bank. NIC Asia Bank is a reputed and well
managed bank in Nepal. The head office and corporate office of the organization is located in
Kathmandu. It has a total of 77 branches all over Nepal. The organization has recently made a
decision of opening a new branch in Gauradaha. I am hired as an It officer of the company. Being
an IT officer of NIC Asia bank, my duty is to analyze the network and create configuration as per
the requirement. This report consists of discussion of different network types, network topologies,
network standards and network protocols. I will describe each type of them with their advantages
and disadvantages and explain briefly why I choose a particular type and why it will be best for
the company. then this report includes discussion of network devices, their functions and why they
are needed to build the network system of this company. finally, this report includes different
aspects of server selection, software and hardware selection with their performance analysis of
network.
Scope
This report will provide a clear view of different network types, network topologies, network standards,
network protocols. This report will provide information about the different hardware devices and software
required for designing the network system of the NIC Asia bank. This report will also provide comparison
between different network standards, server and network topologies.
16
Networking Assignment | first semester
Objective
The following are some important objectives of the report.
• To provide a clarification about different network topologies, network standards, protocols and
servers and choose the best for the company.
17
Networking Assignment | first semester
Introduction
As an IT officer in NIC Asia bank, here I will provide discussion over the protocols, network types
including physical network and logical network. I want to provide the evaluation over the topology
and standards that will be used inside my bank network development. Here, I am going to discuss
and select the range of server and may include physical server and logical to develop the relation
between bank and the customer with strong technical support.
All the department has its own responsibilities and also it has its own infrastructures. First IT
department is core department which manage, configure and use to maintain which include
management of network system, configuration of server and network planning etc. moving on,
finance department is responsible for finance planning of bank, HR department is to manage and
optimize work force, Management department is in-charge of operational management and last
account department is in-charge of handling all the account of bank.
Being a IT for NIC Asia bank, I have to create a new design plan, manage, setup and optimize
the network system so that it could meet the requirements for every departments. Also, I have to
consider IP addressing, manage server system, network devices and security devices so that it
will be easy to transfer the data without any fear of losing it or getting stolen.
18
Networking Assignment | first semester
Discuss the benefits and constraints of different network types and standards.
Computer network
Computer network is the connection of two or more than two computers or devices in order to
communicate and share data electronically. (computer network | Definition & Types (2021).)
Computer network is categorized into two types. i.e. physical network and logical network.
Physical network
Physical network is categorized on the basis of the range or geographical area that a network cover.
PAN is the smallest network among all the other networks. It is typically used for personal purpose.
It covers a range of about 10 meters. It can be used in small offices and residences. PAN is
composed of wireless MODEM, a computer, a mobile phone, printers etc. (Overview of Personal
Area Network (PAN) - GeeksforGeeks (2020))
Advantages:
• It is portable
Disadvantages:
19
Networking Assignment | first semester
• It uses infrared signal which can travel merely travel in straight line.
LAN is one of the most used and discussed network. It is also one of the most common networks.
In LAN, groups of computers are connected within a short distance (within a building) to share
information and resources. It uses topologies like: bus topology, ring topology etc. to connect
devices. LAN can be connected to WAN by use of routers to increase speed of the data transfer.
(Types of Computer Network: What is LAN, MAN and WAN (2021))
Advantages:
• It enables resource sharing (printers, scanners etc.) which helps to reduce expenses on extra
hardware.
• In LAN, one computer of the network can easily share information and messages with
another.
• As server computer stores all data, it is easy to manage and is more secure.
Disadvantages:
SAJAN THAPA | SECTION A
20
Networking Assignment | first semester
• Network devices such as routers, ethernet cable, hub, switches are required for its
installation which is costly.
• Expert like LAN administrator is needed for its installation and management.
• Data can be stolen by an unauthorized person if server hard disk is not properly secured.
MAN is an interconnection of different LANs which covers a larger geographical area such as a
city or town. In MAN, LANs are interconnected to each other by telephone exchange line. It covers
larger ranger than that of LAN. Military uses MAN for communication purposes. Its ownership
and management are handled by a person or a company. (Types of Computer Network: What is LAN,
MAN and WAN (2021))
Advantages:
Disadvantages:
21
Networking Assignment | first semester
Basically, WAN can be described as the networks of networks. WAN covers large geographical
area such as countries and states. Like MAN, it is also interconnection of LANs. Best example of
WAN is internet. Internet is one of the biggest WAN if the world. WAN is essential for
international businesses as well as daily use. With its use information can be shared throughout
the world. (Types of Computer Network: What is LAN, MAN and WAN (2021))
Advantages:
22
Networking Assignment | first semester
• It covers large geographical area (1000km or more). So, information and data can be
transferred within a large area.
• Data are managed in centralized way. So, purchasing emails, files and backup server is not
needed.
• Users get updated files as software companies are always working on live server.
Disadvantages:
• All technologies are mixed together in WAN which creates mores security issues than other
networks.
• For installing WAN, we need to buy network devices such as routers, switches, hubs which
are costly.
• Data are transferred through internet which makes it prone to hacking, stealing. So it
requires antivirus software and firewall.
23
Networking Assignment | first semester
Advantages:
• It can work wireless. Therefore, we can save expenses of extra wires, cables.
• Data sharing in CAN works on LAN, so data transferring in CAN is faster than in WAN.
• Management of CAN is done by IT experts, they can have high level of control over the
network and they can apply many security policies to secure the network.
Disadvantages:
Logical network
Logical network defines the way or structure in which the computers/devices of a particular
network are connected to each other.
Client to server
It is a network where end users known as client access files from a central computer known as
sever. In client to server network, client send requests or orders to the server and server responses
to the client with the data. A client does not contribute at all in this network. Client use network as
24
Networking Assignment | first semester
a medium to contact the server and send and receive information about the provided requests. For
example: when we use our computer and type facebook.com in our web browser, Then, our web
browser sends request to the Facebook server. Facebook server responds to our web browser with
some data and that data is displayed in our browser. Hence, we are using the client computer here
and Facebook is the sever computer. ((Client-Server Model - GeeksforGeeks (2019))
25
Networking Assignment | first semester
• Management is easier because it is easier to locate and find files as all the data is stored in
a single location.
• If there are too many requests at a time, it leads to the crashing and slowing down of the
network. It is very inconvenient to access information if so happens.
26
Networking Assignment | first semester
In peer to peer network, two or more computers are connected in order to share resources and
information without being connected to a central computer(server). In this network, each device
connected to the network contribute to the network. i.e. each computer connects to this network
share part of its resources with the other devices. Every device in this network is known as peer.
An example of peer to peer network can be computers connected to LAN in an office. In LAN,
two or more devices are interconnected and share resources with each other, hence making a peer
to peer network. (What is peer-to-peer (P2P)? - Definition from WhatIs.com (2021))
27
Networking Assignment | first semester
• Malfunction in a computer of the network doesn’t disrupt other parts of the network
• There is less security or no security at all as user doesn’t need to log onto the workstations.
• Data are not managed in centralized system, so it is hard to locate files which results in
wastage of time.
28
Networking Assignment | first semester
Cloud computing
Cloud computing simply means storing and accessing data (photos, videos, texts etc.) over the
internet rather than storing and accessing it over our device’s hard drive storage. It can be
considered as a service provided a company or a person. our data on cloud is stored in a server of
a big company and we can access through the internet. Some examples of cloud computing are:
google photos, google drive, one drive, Samsung cloud etc. (What is Cloud Computing? Beginner's
Guide (2021))
• It is cost effective as it saves the expenses for the resources and saves our time.
• Physical storage center is not required as data can be stored over the internet.
29
Networking Assignment | first semester
• Users have less control, cloud system is owned, controlled by a specific person or a
company.
• In the cloud system, we have to send our important data, files to the service provider which
means they can access it.
Cluster computing
In simple words, cluster computing refers to the combination of many computers connected to the
same network acting as a single entity to carry out a common purpose. In cluster computing, each
computer of the network is called as a node. Here, all nodes work as a single system. Typically,
computers are connected through fast LANs in cluster computing. The operation is executed by
all the computer altogether as a single system. (Cluster Computing : Definition, Types, Advantages
& Applications (2020))
30
Networking Assignment | first semester
Advantages:
• It is cost effective.
• Its performance can be upgraded with the addition of a computer system (node).
Disadvantages:
Distributed computing
Distributed computing is simply multiple software on multiple computer which works as a single
system. In distributed computing, Computers maybe physically close connected through LAN or
geographically far connected through WAN. In a distributed system, the computers are situated on
different network and send and use messages to interact with each other in order to carry out a
common goal. (Distributed Computing | Advantages and Disadvantages (2020))
31
Networking Assignment | first semester
Advantages:
• Its performance can be boosted with the addition of a hardware (a computer system).
Disadvantages:
• Due to its open system, each individual has the responsibility to ensure the security of their
respective computer.
32
Networking Assignment | first semester
OSI model is a conceptual model that is used to define and understand how a computer can
communicate with another over the computer network. Its helps to standardize the communication
function into a computing system regardless of its internal architecture or technology. It separates
the function of a protocol into seven layers. Each layer possesses an ability to use the function of
the layer underneath it and it merely transmits the functionality to the layer above it. Modern
internet is based on TCP/IP instead of OSI model. All seven layer of the OSI model are briefly
explained below. (What is OSI Model | 7 Layers Explained | Imperva (2021))
33
Networking Assignment | first semester
Advantages:
• Because it is a layered model, changes in one layer does not affect other layers.
• Every layer’s protocols can be replaced easily depending upon the network’s nature.
Disadvantages:
• The layers in the OSI model are dependent upon each other, they need to wait for its
predecessor to receive data.
SAJAN THAPA | SECTION A
34
Networking Assignment | first semester
1. Physical Layer
The physical layer plays a vital role in the wireless connection or physical cable connection
between network nodes. It defines the plug, electrical cable, or wireless technology that connects
devices and is responsible for transmitting raw data, which is simply a sequence of zeros and ones,
while controlling rate of bit control. (What is OSI Model | 7 Layers Explained | Imperva (2021))
3. Network Layer
There are two main functions of the network layer. One is to divide the segments into network
packets and gather the packets on the receiving side. The second is to route packets by determining
the best route through the physical network. the network layer works on network addresses, usually
internet protocol addresses for routing packets to a target node. (What is OSI Model | 7 Layers
Explained | Imperva (2021))
35
Networking Assignment | first semester
4. Transport Layer
Transport layer is the fourth layer of the OSI layer from the top. Providing communication services
directly to the application processes being run on different hosts is the main function of the
transport layer. Data transmitted in the session layer is received by the transport layer and it further
separates it into segments on the transmitting end. Transport layer rearranges the segments on the
receiving end and turns it back into data which is usable for session layer. The transport layer does
the flow manipulation, sending data at a rate that matches the device’s speed of connection, and
error control, checks whether the data was received incorrectly and if not, application layer
requests it again. (What is OSI Model | 7 Layers Explained | Imperva (2021))
5. Session Layer
The session layer generates a channel called a session for communication. Session layer holds the
responsibility for opening sessions and making sure that the session stays open and functional
during the time of data sharing, and closes it when the communication ends. The session layer may
as well as set checkpoints while data is being transferred, in case of interruption of the session,
devices can resume transferring data from the last checkpoint. (What is OSI Model | 7 Layers
Explained | Imperva (2021))
6. Presentation Layer
The Presentation layer is the sixth layer of the OSI model. Presentation layer is also called as the
translation layer because it works as a data translator in the network. presentation layer extracts
and manipulates the data which it receives from the application layer as per the needed format and
it transfers the data on the network. providing or defining the format of data and encryption is the
major function of the presentation layer. The presentation layer maintains the proper syntax of the
data that it receives or transmit to other layers. Therefore, it is also called as the syntax layer. (What
is OSI Model | 7 Layers Explained | Imperva (2021))
36
Networking Assignment | first semester
7. Application Layer
The application layer is the seventh layer of the OSI layer. The application layer is the closest one
to the end-user. So, the end-user and the application layer can communicate directly with the
software application. End-user software like web browsers, email clients etc. use the application
layer. the application layer ensures if enough network resources are present for the requested
communication. Software is provided protocols by the application layer in order to send and
receive information and provide meaningful data to the user. Simple mail transfer protocol
(SMTP), file transfer protocol (FTP), hypertext transfer protocol (HTTP), post office protocol
(POP), domain name system (DNS) are some examples of the application layer. (What is OSI
Model | 7 Layers Explained | Imperva (2021))
IEEE 802 is a set of networking standards which cover specifications of data link layer and
physical layer for technologies like wireless and ethernet. These specifications are applicable to
metropolitan area networks (MAN) and local area networks (LAN). IEEE 802 standards assists to
ensure that internet services and technologies follow a set of recommended practices so network
devices can work altogether smoothly. (What are the IEEE 802 Standards? (2021))
IEEE 802.2 – it is sub-divided into two parts. Logical link control (LLC) and control of access to
media (MAC).
IEEE 802.5 – it divides MAC layer for the token ring network
37
Networking Assignment | first semester
38
Networking Assignment | first semester
As per the scenario, one of the reputed and well managed bank of Nepal NIC Asia bank is going
to open a new branch in Gauradaha. As an IT officer, it is my responsibility to choose the
networking principles and protocols which is best and effective for my company NIC Asia bank.
I would choose OSI model. The OSI model consists of seven broad categories in its stack. This
makes debugging issues much easier because there are different layers in the protocol stack that
handles a specific function that’s eradicates load from the small partitions in the TCP layer. For
example, the presentation layer handles the part of the syntax configuration data, data encryption
and decryption and the session layer handles chat controls, syncing between computers. Thus, the
application crust load is reduced.
Network protocol
Network protocol is a set of rules, data structures that defines how devices over a network
communicate and share data. In simple words, network protocol is a language that the devices use
to communicate with each other regardless of their differences in design and structure.
OSI model
To understand network, protocol we need to know about the open systems interconnection (OSI)
model. Most of the network protocol’s structure are based on OSI model. The OSI model breaks
a communication process between two devices into 7 layers. These layers are assigned a task or
group of tasks. All of these layers can work independently.
39
Networking Assignment | first semester
• It provides standard services such as file transfer
• It masks the difference in data formats between dissimilar systems and it encrypts and
decrypts data and compresses and decompresses data.
(ManageEngine, c. (2021))
The following are some major network protocols used in network communication:
40
Networking Assignment | first semester
41
Networking Assignment | first semester
As an IT officer of NIC Asia bank I will explain briefly why a network topology impacts the performance
of a computer network. Network topology in a computer network helps in making a system stable. Network
topology helps to understand two vital things. One is that it helps us to understand different components of
our network and where they connect. Second one is that it shows us what can be expected from their
performance and how they interact. Network topology is important for performance management. The
layout of a computer networks impacts the functionality of a computer network directly. It determines how
the network functions. Selecting a right topology may improve performance and efficiency of data in a data
and it may also improve the troubleshooting of the errors, allocation of resources and reduce unnecessary
expenses.
Network topology
A network topology can be simply defined as a structure in which devices of a network are
connected to each other. A network topology shows how the devices linked to a same network are
connected to each other. It can also be called as a layout of a computer network. network topology
of a computer network has a direct impact on the network’s functionality. Different types of
network topologies are: (What is Network Topology? Definition and FAQs | OmniSci (2021))
• Star topology
• Ring topology
• Bus topology
• Mesh topology
• Hybrid topology
SAJAN THAPA | SECTION A
42
Networking Assignment | first semester
star topology
In a star topology, each devices of a network are connected to a central controller (hub/switch). It
doesn’t allow the devices to communicate with each other directly. Here, switch or hub act as a
server and other devices of the network act as clients. In star topology, if a device sends a data it
is transmitted to the hub/switch and it sends the data to the target device. (Computer Network
Topology - Mesh, Star, Bus, Ring and Hybrid (2019))
• It is easier to install.
• It requires less cable as each device need to connect to the hub only.
• It is easier to detect faults in star topology because identification of the link is easier
• The whole network goes down if the hub goes down as every device is dependent upon the
hub.
43
Networking Assignment | first semester
Ring topology
In ring topology, each device is connected to exact two other devices which forms a single
continuous pathway for signal through every device. Each device on ring topology has a repeater.
If a device wants to send a data, the data is sent in one direction and the repeater forwards it to
another device and this continues until the target device receives the data. . (Computer Network
Topology - Mesh, Star, Bus, Ring and Hybrid (2019))
• It is easy to install
• The flow of data is in one direction which reduces the data collision
44
Networking Assignment | first semester
• The hardware that it uses is more expensive than ethernet and hub/switch.
• To transfer a data, the data must transfer through each workstation which may affect its
speed.
Bus topology
In bus topology, each device is connected to a single cable through drop line. A coaxial cable/RJ-
45 is used to connect all devices. The cable is the backbone of the network in bus topology. It uses
a device named tap to connect the drop line to the main cable. . (Computer Network Topology -
Mesh, Star, Bus, Ring and Hybrid (2019))
45
Networking Assignment | first semester
• It is easy to install as each device needs to be connected to the main cable only.
• There is a limit on how much nodes can be connected to the main cable.
Mesh topology
In the mesh topology, one device of a same network is connected to every other device of the network. It
allows the most transmission to be distributed even if one connection is not working. There are two forms
of mesh topology. They are partial mesh topology and full mesh topology. In partial mesh topology, at least
two devices are connected to multiple other devices. Whereas in full mesh topology, each device is
connected to every device of the network. (Computer Network Topology - Mesh, Star, Bus, Ring and
Hybrid (2019))
46
Networking Assignment | first semester
• Data can be transmitted by multiple devices simultaneously. So, it can manage high
number of traffic.
Hybrid topology
Hybrid topology is a network topology which uses two or more topologies of different types. It can be said
that hybrid topology is just a combination of two or more type of topologies. Those topologies may include
ring topology, star topology, mesh topology, bus topology and tree topology. It is usually used in a
company, office where there are high number of computers. . (Computer Network Topology - Mesh, Star,
Bus, Ring and Hybrid (2019))
47
Networking Assignment | first semester
• It is easy to add networks and computers without causing disruption to the whole network.
• Hubs used in this topology are different and expensive than that used in other topologies
because it should be able to co-operate with other topologies.
48
Networking Assignment | first semester
According to scenario, there are five departments in NIC Asia bank: IT department (5 computers),
Finance Planning (14 computers), HR Department (4 computers), Management Department (13
computers), Account Department (7 computers). As an IT office of NIC Asia bank of Gauradaha
branch I will choose the best topology for the company on the basis of data transmission speed,
efficiency and its functionality. I think hybrid topology would be suitable because we would want
to cause less disruption on the network system of a company which is always busy like a bank. So,
hybrid topology allows us to add a new network system or a computer system to the main network
without the need to stop the network or data transmission. Also, troubleshooting and fixing fault
is easier and maintenance of one connection can be done without creating issues to other
connections. Hybrid topology is combined of two or more types of topologies. Therefore, it can
be designed and built as per the need of the organization.
Communication requirement
Guided media
Guided media can be defined as a physical medium through which signals are transmitted. It uses
cabling system which has fixed or limited path. For examples, copper wires, fiber optic wires etc.
(Guided Transmission Media - javatpoint (2021))
Twisted pair
It is made up of a pair of separately insulated conductor wires that are twisted with each other.
Twisted pair cable is the most widely used transmission media. Its frequency ranges from 0 to
3.5Khz. There are two types of twisted pair cable, unshielded twisted pair and shielded twisted
pair. (Guided Transmission Media - javatpoint (2021))
49
Networking Assignment | first semester
Advantages:
• It is easy to install.
Disadvantages:
50
Networking Assignment | first semester
Advantages:
• It eradicates crosstalk
Disadvantages:
• It is more expensive than unshielded twisted pair cable and coaxial cable.
Coaxial cable
Coaxial cable has two conductors parallel to each other and separated by an insulator. The central
or inner most conductor is a copper wire and the second conductor that surrounds the insulator is
made up of metal foil, braid or both. The outer conductor is used as shield against electro-magnetic
51
Networking Assignment | first semester
noise and it also completes the circuit. Second conductor is also covered by an insulator. The
outermost layer of the coaxial cable is a plastic jacket/cover. Coaxial cable is of two types. One is
broadband which transmits digital signal and second is baseband that transmits analog signal.
(Types of Transmission Media - GeeksforGeeks (2018))
Advantages:
• It is inexpensive.
Disadvantages:
52
Networking Assignment | first semester
Advantages:
• It has capable of transmitting huge volume of data and has high bandwidth.
Disadvantages:
53
Networking Assignment | first semester
• It is difficult to install.
• It is expensive.
Unguided media
It is also called unbounded media or wireless. It uses electro-magnetic signals for transmission.
Physical wires aren’t used in unguided media.
Radio waves
Radio waves are electro-magnetic waves that can travel in all direction. They can be generated
easily and can penetrate/travel through solid objects e.g. buildings. The frequency of radio waves
is from 3KHz to 1GHz. (Types of Transmission Media - GeeksforGeeks (2018))
Advantages:
54
Networking Assignment | first semester
Disadvantages:
• They can’t transmit lot data simultaneously because of its low frequency.
Microwaves:
They are electro-magnetic waves. Its wavelength shorter than radio waves. For signal transmission
through microwaves, sending and receiving antennas should be perfectly aligned with each other.
The height of the antenna is directly proportional to the distance travelled by microwaves. It covers
a range from 1GHz to 300GHz. (UnGuided Transmission Media - javatpoint (2021))
Advantages:
Disadvantages:
• It is dependent upon weather. If there is rain, wind, it can cause distortion of signal.
55
Networking Assignment | first semester
56
Networking Assignment | first semester
Infrared
It is widely used for short distance signal transmission. It cannot penetrate through walls. Its
frequency ranges from 300GHz to 400THz. Infrared waves are used in remote, wireless keyboard
and mouse, printers. (Types of Transmission Media - GeeksforGeeks (2018))
Advantages:
Disadvantages:
57
Networking Assignment | first semester
• It is unreliable if used outside building as sun rays can interfere with infrared waves.
The amount of data that can be transferred from on network to another in a specific amount of
time is called bandwidth. As we know that different type of application will require different
types of network bandwidth levels. Every task which are completed over the network consume
bandwidth with bits per second speed. It can identify the speed of data bits flowing from one
network to another. Bandwidth is measure in Hertz (Hz) as frequency of data transfer rates is
measured in cycles per second.
There are many factors affecting bandwidth in networks such as quality of cables used to transfer
the data. Also, network bandwidth determines our network capacity and impacted by the design
of our cabling system. Optical fiber cables and laser signals are very capable of transferring large
amount of data in less amount of time. moreover, the congestion on the highway also impacts out
bandwidth for example if we send a packet from computer A to computer B which are located in
different place then out packet will travel from one node to another and also gets redirected to
many multiple nodes and gets queued and Ultimately this leads to delays in packets to reach
destination and hamper our bandwidth. Cables and its bandwidth are listed below:
58
Networking Assignment | first semester
59
Networking Assignment | first semester
Networking devices
Networking devices are those devices that are used to connect electronic devices like computer,
printer and many other electronic devices to a network in order to communicate and share
resources with other devices. They can transmit data in a fast and secure way over a same or
different network. some networking devices are in-built in a device like NIC card, RJ-45 connector
while some devices like Router, switch, hub are a part of the network.
Requirement
Networking devices are compulsory for building any network. without networking devices, data
sharing between devices is impossible. In a computer network, every network device has a key
role to complete and make a network functional. To make different device communicate and
transfer data, we need different networking devices to interconnect different electronic devices
like computers, fax machines.
I am going to list some networking devices that I need to build my network. they are:
• Router
• Switch
• Repeater
• Hub
• Modem
60
Networking Assignment | first semester
Router
Router is a networking device that connects two or more packet- switched network. it is used to
connect LAN to the internet. It has multiple interfaces that helps it to receive data packets through
them. (Computer Networking Devices Explained with Function (2021))
Fig: router
Functions:
• Addressing packets and calculate which interface to forward the packet to.
In my company (NIC Asia bank, Gauradaha branch), there are 5 departments with multiple
computers in each. So, I want the devices to connect to the internet and connect to each other. And
router also helps to create local networks which are useful to share files and software tools among
the employees.
61
Networking Assignment | first semester
Switch
This networking device uses twisted pair cable to connect multiple devices to ethernet network. It
receives, stores and forwards packet using packet switching method. It keeps an update table/list
of whether packets are transferred or not. (Network Devices (2021))
Fig: switch
Functions:
I need switch in my network to connect multiple devices like computers, printers, servers on the
same network and to enable devices to communicate with each other and share information.
62
Networking Assignment | first semester
Wi-fi devices
Those devices that can interface with the internet through wireless networking technology called
wi-fi (wireless fidelity) are known as wi-fi devices. Some examples of wi-fi devices are, mobile
phones, laptops, wireless printers and cameras etc. In wi-fi, internet connectivity occurs through a
wireless router. (Services, P. (2021)
Wi-fi connection is important in my network because employees and customers need to connect
their mobiles phone to the internet. employees can also connect their laptop to internet without
having to connect it through an ethernet cable.
Repeater
A repeater is a networking device that retransmits an incoming signal after regenerating or
amplifying those signals. It consists of two port. It operates on the physical layer of the OSI model.
(Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter) -
GeeksforGeeks (2015))
Fig: repeater
Function:
63
Networking Assignment | first semester
Modem
Modem is a networking device that is connected to the telephone line to connect computer to the
internet. A modem is a combination of a modulator and a demodulator. Modulator converts digital
signal into analog and demodulator converts analog signal into digital signal. (Network
Devices (2021))
Fig: modem
Function:
Its main function is to modulate incoming analog signal from our ISP (internet service provider)
into digital signal that our router translates and distribute it to the devices and demodulate digital
signal from our computer into analog signals that can be transmitted over telephone line.
Hub
This networking device is a centralized device that connects multiple devices in a single LAN. It
is a physical layer networking device. When a computer sends signals/data to the hub, It transmits
64
Networking Assignment | first semester
the incoming data/signal to the all remaining computers connected to it without regard of if the
data is destined for the device. (Network Devices (Hub, Repeater, Bridge, Switch, Router,
Gateways and Brouter) - GeeksforGeeks (2015))
Fig: hub
Function:
I need VPN in my network to provide safe encryption. This will help to secure our online activities
from hackers.
65
Networking Assignment | first semester
Workstation
A workstation is a computer designed with more powerful CPU and GPU than a regular personal
computer. It is a single-user computer. It consists of high memory, power hard disk and has high
graphic performance. It is usually used for intensive tasks like graphic designing, rendering, video
editing. (workstation | Definition & Facts (2021))
Function:
To perform heavy tasks smoothly, effectively and conveniently than normal personal computers.
Server
A server can be defined as a hardware device or software that provides services to other computers
called clients over network (either LAN or WAN). It responds to the requests made by clients over
the network.
Sever plays a vital role in providing resources needed over a network. files and data are stored in
a server centrally. So, users can access files easily whenever they need. A server provides powerful
processing. It stores large volume of data, freeing up memory space from each individual computer
and allowing them to perform better. (server | Definition, Examples, & Facts (2021))
Sever is categorized into two types: physical server and logical server
Physical server
Physical servers are powerful computers that is used as data center and provide services to other
computers over a network. There are three types of physical servers:
1. Tower server
2. Rack server
SAJAN THAPA | SECTION A
66
Networking Assignment | first semester
3. Blade server
Tower server
Tower servers are the most basic and cheapest servers. Its appearance is pretty similar to that of a
normal desktop CPU, but its size is comparatively bigger than normal desktop CPU. Tower servers
can’t be stacked over one another. So, a large number of tower servers can occupy a large space.
It doesn’t consist advanced graphics cards, dedicated cooling fan, dedicated higher memory. They
are added separately as per the requirement of an organization. It is suitable for organizations that
need less than four servers. (Blade Servers vs Rack Servers vs Tower Servers |
ServerWatch (2020))
• Its maintenance is easier. New servers or device can be added to it without disrupting the
entire server.
• There is no need to turn off the server system while repairing it.
67
Networking Assignment | first semester
Rack server
In Rack server, servers are vertically stacked upon each other inside a rack. Rack server is also
known as rack-mounted server. Structure of server rack is designed in a way that each server slide
in and out with ease. They consume comparatively very less space than tower server on the basis
of number of servers. Server rack may contain cables, cable management bar, patch panels,
supporting equipment, router/switch. The unit of measurement of rack server is done in rack unit
(U or RU). One U is equal to 1.75 inches (44.45mm). The most common standard server rack
width is 19 inches. It is suitable for company that uses less than 25 servers. . (Blade Servers vs
Rack Servers vs Tower Servers | ServerWatch (2020))
Advantages:
• Maintenance cost for rack server is low as compared to same quantity of tower server.
• One server can be repaired without having to turn off the entire server.
Disadvantages:
• If the population of servers is dense, more cooling unit is need. More energy cost is needed.
68
Networking Assignment | first semester
Blade server
Blade server is made up of chassis that encloses modular thin circuit boards called server blade.
Blade server can also be called as advanced version of rack server. The server consists of CPU,
memory, integrated network controllers and some built-in storage devices. It gets other necessary
components from the server chassis. It is suitable for organizations that use up to 40 servers. (Blade
Servers vs Rack Servers vs Tower Servers | ServerWatch (2020))
• Server chassis provides power supply to multiple blades instead of providing power and
cooling several racks.
• Its structure makes centralized system, load balancing and maintenance easier.
• Dense population of blade server produces tremendous amount of heat. So, they need more
cooling unit which requires more energy supply leading to more energy expenses.
69
Networking Assignment | first semester
As per the scenario, there are 5 department in NIC Asia bank, Gauradaha branch: IT department,
finance planning department, HR department, management department and account department
with 5 computers, 14 computers, 4 computers, 13 computers and 7 computers respectively. Among
the three servers discussed above (tower server, rack server and blade server), I think rack server
will be the most suitable and benefitable one. I don’t think high quantity of servers (more than 25)
will be needed for a company like bank. In this case, the rack server fits perfectly. It comes at
lower cost than blade server. Due to its stackable structure inside a rack, it occupies less space and
fits many servers. Cable management is easy even is the servers are densely populated. Servers
can be added and maintenance can be done without disrupting the entire server.
70
Networking Assignment | first semester
Specifications:
Logical server
Some logical servers are described below:
File server
It manages requests from clients for files stored on the server’s local disk. A central file server
allows users to share and access data in multiple ways.
71
Networking Assignment | first semester
DNS server
DNS (Domain Name System) server is an inter-wide distributed database system that documents
and distributes network specific information such as the associated IP address for a host name and
vise-versa.
In my network, I need DNS server in order to assign IP address to the computers connected to the
network automatically.
Mail server
It is the most efficient way to receive and store electronic mail messages for a community user. A
central mail server runs 24 hours a day. It can also provide global email directory for all community
and organization’s users as well as email gateway and relay service for all mail servers.
The employees of NIC Asia bank need to send mails to each other on the network, so mail server
is needed.
DHCP server
DHCP dynamically assigns IP address, default gateway and other data to each client devices on
the network. It assigns a unique dynamic IP address for each client.
In my network, I need DNS server in order to assign IP address to the computers connected to the
network automatically.
72
Networking Assignment | first semester
NIC Asia bank is opening a new branch in Gauradaha and I have been assigned as the IT officer
in the IT department. As an IT officer my responsibilities are to Plan, manage, design, implement
and optimize the network system for the organization considering IP addressing, Server System,
various other services, Network devices, Security devices etc. for this I will illustrate
interdependence of workstation hardware with relevant networking software which are suitable
for the bank.
As per the requirement of the bank, I have selected various hardware and computer system required
for the bank.
Hardware/Software dependency
OS- windows 10 We can’t get GUI (graphical user interface)
without an operating system.
RAM-8GB RAM is necessary for higher data efficiency
and fast processing.
Graphics-1GB For fast transferring, using and creating
multimedia files, graphics is necessary.
Processor-Intel i7 Processor is the main part of computer system
that processes the data/instruction.
73
Networking Assignment | first semester
Hardware/software dependency
OS- windows server 2016 We can’t get GUI (graphical user interface)
without an operating system.
RAM- 64 GB RAM is necessary for higher data efficiency
and fast processing.
Graphics-16 GB For fast transferring, using and creating
multimedia files, graphics is necessary.
Processor- Processor is the main part of computer
system that processes the data/instruction.
74
Networking Assignment | first semester
Client software
Client software is certain software applications installed in our computer that is used to
communicate to the piece of software over a network. It is used by client to connect and
communicate to the computer hardware / server. for example: Netware, Firewall, RDP protocol.
Firewall is a software that protects from an unauthorized access to a network. it uses set of rules
in a network traffic to identify and block threats.
RDP (remote desktop protocol) is developed by Microsoft that provides a graphical user interface
to a user to connect to another computer over a network.
NetWare is a network operating system that provides networking services to network users like
data accessing, security and resource management.
Server software
Server software are built to be operated on a server computer. It is a software designed to interact
with the hardware like, processor, memory, storage, input/output and communication ports. As we
know server hardware is powerful or high-end. So, server software is used to harness its computing
power.
75
Networking Assignment | first semester
Conclusion
NIC Asia bank ltd hired me as their IT officer and I was given the task by the manager of preparing
a report on the concepts related to networking principles and topology, devices and their operating
principles and proposing a topology that will be suitable for the scenario. so, firstly I discussed
about the benefits and constraints of different network types and standards. Then, the impact of
network topology, Communication and bandwidth requirements, compared common networking
principles and how protocols enable the effectiveness of networked systems, chose a network
topology and evaluated it. I also described briefly about networking devices required for creating
network for the bank and discussed about servers and chose a server for the network of the
company. At last, I discussed the inter-dependence of workstation hardware with relevant
networking software and performance optimization.
76
Networking Assignment | first semester
As an IT officer of NIC Asia bank, it is my responsibility to design a network that meets the
requirements of the scenario. I have already discussed about networking devices that is required
for the network system of NIC Asia bank. It is my duty to build a secure and reliable network
system for NIC Asia bank.
I am going to design a network system using Visio tool. After that, I will implement the design in
the cisco packet tracer. I will use one router and one switch for each department. I will do all the
necessary configurations like IP configuration, IP routing etc. then I will provide DHCP server to
assign IP address to each PC automatically. I will manage mail server, FTP server, DNS server
and HTTP server.
77
Networking Assignment | first semester
Physical design
78
Networking Assignment | first semester
The diagram above is the physical network design for the network I am going to design for the
NIC Asia bank PVT LTD. There are five departments: IT department, HR department,
management department, Finance department and account department. The diagram shows three
computers in each department but we will be using five computers in IT department, fourteen
computers in Finance department, thirteen computers in management department, four in HR
department and seven computers in account department. I have taken five routers (one for each
department) and five switches (one for each department) for the network. each pc of all
departments is connected to their respective switches and each switch are connected to their
respective routers. The routers are connected to each other in a loop form. i.e. every router is
connected to two routers. I have managed two servers in IT department where DNS, SMTP,
DHCP, FTP will be configured.
Subnetting table
79
Networking Assignment | first semester
Device requirement
Overview
I recently completed a network design for NIC Asia Bank. To do this operation, I have created a
network on VMware workstation and installed the ADDC server and client server. I'm going to set
SAJAN THAPA | SECTION A
80
Networking Assignment | first semester
them up and link them. I've included a screenshot of the server. I've attached a snapshot of the
server installation and configuration procedure below:
81
Networking Assignment | first semester
82
Networking Assignment | first semester
As the service is not available, I am going to add the active directory domain services.
83
Networking Assignment | first semester
84
Networking Assignment | first semester
After the installation is finished, I am going to add the new forest name nicasia.com.
85
Networking Assignment | first semester
After that it appears in capital letter NICASIA and the process begins and the server restarts.
86
Networking Assignment | first semester
The NICASIA appears in capital letter as we can see in the above screenshot.
87
Networking Assignment | first semester
88
Networking Assignment | first semester
89
Networking Assignment | first semester
90
Networking Assignment | first semester
91
Networking Assignment | first semester
92
Networking Assignment | first semester
93
Networking Assignment | first semester
After inserting IP address to the client, I ping through IP address and its name (nicasia.com)
94
Networking Assignment | first semester
After inserting domain name into the client, the message received as welcome message appear on
the screen.
As we can see that domain user can access the client services.
95
Networking Assignment | first semester
After entering the username and password we can see the domain name appear on the screen called
nicasia.com.
96
Networking Assignment | first semester
Test and evaluate the design to meet the requirements and analyze user
feedback with the aim of improving efficiency.
As per the requirement of the provided scenario, I have designed a network system in visio tool
and implemented the design in cisco packet tracer. For the completion of the task I am going to
make a test log consisting what is to be tested and expected output. I am going to evaluate the
design with the scenario requirement. Also, I am going to collect feedback from users. At last, I
will analyze the feedback.
Independent feedback
Date:10-11-2021
Project description (in brief): As per the requirement of the scenario, I have designed a
network system for the NIC Asia bank with the help of Visio tool and implemented it on Cisco
packet tracer. I have arranged numbers of PC for all departments as per the scenario. I have used
one router and one switch in every department. I have then added DHCP server in the network
to automatically assign IP addresses to each pc of all department. I have added mail server so
that employees can send emails to each other. Then, DNS is added to provide domain name to
the host IP. To prevent the network from computer viruses, unauthorized activities, I have
configured I have managed firewall in the system. I also configured VPN to create a secret tunnel
to provide a secure connection.
97
Networking Assignment | first semester
Have identified DHCP server, yes These servers are configured in the design.
DNS server, FTP server, mail
server?
98
Networking Assignment | first semester
Does the system solve the problem yes All systems are well managed and security is
of the client? provided to secure the entire network.
Does the system fulfill the yes All the necessary requirements are fulfilled
requirement of the client? Security and IP are provided by DHCP server.
and IP arranged as per the client’s
requirement?
Have implemented routing and yes Routing and switching are performed to
switching? make communication between connected
devices of the network.
Significance of the project 1. The design has well defined and manage hardware
system.
2. Information can be transferred anytime within network as
well as outside of local network.
3. Duplicate users cannot be added. For mail servers,
hardware security is there for protection against
unauthorized access of routers, switches and server.
4. Login is allowed for only valid users with correct
username and password. Administrator has different
authentication than users.
5. It supports remote management using telnet.
6. It supports vlan, intervlan, VPN communication with
other departments securely.
Project limitation 1. There are only two types of users (admin and user).
2. Without internet communication, there is no outside
LAN communication.
3. It lacks high security like ACL, NAT, port security etc.
4. Low range of hardware is used.
Feedback evaluation
Feedback evaluated by: Sajan Thapa Signature:
99
Networking Assignment | first semester
Date: 11-09-2021
Evaluation of the system: As an IT officer of NIC Asia bank, I have designed a network system
with the help of Visio tool and implemented the design in Cisco packet tracer. I have used the
same number of computers in each department as per the scenario. I have used one switch and
one router in each department. The fives routers are connected in a form of loop.
I have added DHCP server in the network to automatically assign IP addresses to each pc of all
department. I have added mail server so that employees can send emails to each other. Then,
DNS is added to provide domain name to the host IP. To prevent the network from computer
viruses, unauthorized activities, I have configured I have managed firewall in the system. I also
configured VPN to create a secret tunnel to provide a secure connection.
This network system is effective, productive and secure and meets the requirement of the NIC
Asia bank
Function of hardware: Hardware like router, switch, different cables, PC, printer, access point,
server, cables are used in the network.
• Router is used to interconnect wired as well as wireless devices.
• Access point is used as point of interconnection between WLAN and fixed wired
network.
100
Networking Assignment | first semester
Sever are used to provide constant services to the clients. For example, File server manages and
stores data.
Routing:
Routing is performed to make connection between different network. It creates best route for
data packet transferring. I have done routing for network 192.168.10.0
Security:
For the security, firewall, VPN is configured in the network. firewall protects from unauthorized
access of the files within the network, VPN creates tunnel for secure data transmission. telnet is
configured to access another PC and router by administrator remotely.
Recommendation for the future consideration:
I have designed a network system that meets the requirement of the NIC Asia bank. I have
implemented the design properly. However, there are few limitations of the design like security.
These limitations can be eliminated to make the network system more productive and effective.
Expensive and high configuration can be used to make it more secure, efficient and reliable. For
high security, ACL, NAT, Port security and be configured in the network.
Test log:
S.no What is to be tested Expected output
101
Networking Assignment | first semester
8. Domain controller Other domain are able to share resources within network only
testing while authorized member can use all the services of the company
within that network.
I have designed a network system for the new branch of NIC Asia bank as per device, software,
security requirement of the given scenario. There are different hardware and software in the
network. These hardware and software can malfunction unexpectedly at any time. As the NIC Asia
bank is a huge company, a stop on the network system can create a huge loss. So, maintenance of
its network system should be done from time to time. To keep the network well managed and
effective, following steps should be carried out.
These tasks should be performed for the maintenance of the network system. I have divided the
whole maintenance work on the basis of following factors for the backup, upgrades, security and
auditing. These are the maintenance tasks to make system better and faster.
I have made a schedule for the maintenance work for the network system of the network system.
I have prepared it using Gannt chart.
102
Networking Assignment | first semester
Maintenance schedule:
Backup:
Backup is the process of creating and storing the copy of original data of the devices on the network
system so that it can be used when the data is stolen or corrupted. Hardware do crash and files get
corrupted. So, in case of original data damage, backup is very useful. These disasters can happen
any time. So, daily backup is very essential. Therefore, I have prepared daily backup schedule for
103
Networking Assignment | first semester
the maintenance work instead of weekly, monthly or yearly schedule. As many servers are stacked
in rack server, data can be backed up in multiple servers.
Upgrade:
Upgrading in a network system is really essential. Adding or replacing better hardware and
software provides flexibility to a network system. Better hardware and software provide better
efficiency with less chances of failure. It also provides access to more powerful computing, better
security and more storage space. It makes the system more productive. Therefore, I have prepared
a monthly upgrade schedule for the maintenance work.
Security:
Network security is the most important in the network system to protect from unauthorized access,
misuse, malfunction, modification, destruction, or improper disclosure, destruction etc. I have
implemented firewall in the network system, which handles the incoming and outcoming traffic
and decides whether to block or allow the traffic using set of rules. To secure the network, regular
scanning of the network and checking the firewall configuration is necessary. So, I have prepared
daily and weekly schedule for the maintenance work.
Troubleshooting:
Trouble shooting is the combination of methods, steps and processes that is used to identify,
diagnose and solve problems throughout a network. It is a logical process which is used by network
administrators to solve the problem of computer network and improve the network. there are many
hardware/software used to build a network. They can malfunction and create troubles. It can
obstacle the work in the NIC Asia bank. So, I have prepared a monthly schedule for
troubleshooting of the computer network to keep it running effectively.
104
Networking Assignment | first semester
Network implementation
As per the scenario, I have designed a network system and implemented it in cisco packet tracer.
I have worked with different PC, routers, switches, server, cables etc. I have provided IP addresses
to all devices of the entire network with gateways. As NIC Asia bank is a very big company, I
have managed all the system with security. I have configured all cisco devices and assigned IP
address, security, routing, DNS, DHCP and mail server also. As a big company, employees of NIC
Asia bank need to connect to each other. I have assigned mail address through which all employees
can interconnect. As the company requires HTTP page, I have also managed it. Some of the
configuration screenshots are provided below:
IP configuration
At first, I configured IP addresses manually then I added a DHCP server that assigns IP addresses
automatically.
DHCP
I added DHCP server to assign IP addresses to each PC automatically.
105
Networking Assignment | first semester
IP route
After assigning IP addresses to each PC, I did routing. The picture below is the IP
route.
Password
After that, I provided password security to all devices to secure files, documents.
106
Networking Assignment | first semester
Enable secrete
Enable secrete provides an additional layer of security. With enable secrete, the password is
encrypted.
107
Networking Assignment | first semester
108
Networking Assignment | first semester
DNS
DNS domain name into IP addresses, which browsers use to load web pages
109
Networking Assignment | first semester
HTTP
It provides users a way to interact with web resources such as HTML files by transmitting
hypertext messages between clients and servers.
110
Networking Assignment | first semester
111
Networking Assignment | first semester
Email
It is used to create email address with the domain name that we provided to the server.
112
Networking Assignment | first semester
As an IT officer of NIC Asia bank, I have designed a network system and implemented it on cisco
packet tracer. Several hardware, software along with VMware workstation is used to build the
network system.
Although this hardware /software are suitable, effective, efficient for the designed network, they
are low range/low-end devices. The network system can be made more productive, efficient and
effective through the replacement of those devices, software. Higher performance devices can be
used in order to get the best of the designed network system. This will result in the enhancement
of the potential of the network communication. The major potential that can be used for the system
are discussed below:
1. Hardware
For the hardware enhancement, the currently used processor can be replaced with a better one. We
have used intel i7 processor which is the latest one of the intel company.
But we can use AMD Ryzen 9 5900X processor which has higher performance capability than
intel i7. We can upgrade 8 GB RAM with 16 GB or higher for higher data efficiency and helping
in faster data processing. 500 HDD can be upgraded to 1TB SSD to make computer more effective
113
Networking Assignment | first semester
and provide it more storage space. As the company goes on progressing and expanding, the blade
server can be more efficient over rack server. Blade server would be perfect for providing service
to the clients in such a large organization.
2. Software
Software has a vital role in optimizing hardware devices. The current operating system can be
upgraded to the latest one when it is available. Windows 10 operating system has been currently
used for the client PC. After windows 11 operating system, we can replace windows 10 with it.
Latest operating system provides better feature, security which can be more productive. Latest
firewall can be used to make network immune against dangerous computer viruses and against
hackers.
3. Security
For a company like a bank, threats like information theft, data loss, malware, hacking attempts,
unauthorized activities can be common and troublesome. For the prevention against these risks,
installing the latest firewall can be very useful. There are different types of firewall security devices
like watch guard firebox T10, Cyberoam CR 15iNG, checkpoint 1100 appliances etc. available.
Watch guard helps users to create, edit policies, manage certificates, subscription services.
4. Cables
Several types of cables are used in LAN, MAN and WAN. The type of cable determines the data
transfer speed of the network. so, cables are really important for a network. Gigabit ethernet cables
routers are commonly used as it provides bandwidth of 10 MBPS, 100 MBPS. It supports all three
types of cable. Cat 5, Cat 5e had been most commonly used in the past whereas Cat 6 is commonly
used at the present. Cat 6 is suitable for 10 Gigabit uses and Cat 7 is suitable for 40 Gigabit uses.
Cat 6 is suitable for the designed network but Cat 7 can be used if higher data transfer speed is
required for the network.
114
Networking Assignment | first semester
5. Switch
For an efficient and effective network system we need to select a best switch for the ethernet
connection. There are many decent switches available. TP-Link TL-SG108 with 8 Gigabit ports
has the best budget and can deliver a good performance. It has switching speed of 16Gbps.
NETGEAR Nighthawk S8000 with 8 Gigabit ports is versatile for home and office. It also has
switching speed of 16Gbps. The most suitable one for the NIC Asia bank is TRENDnet TEG-
224DG with 24 Gigabit ports, it is suitable for large organizations. It has switching speed of
48Gbps.
115
Networking Assignment | first semester
116
Networking Assignment | first semester
117
Networking Assignment | first semester
118
Networking Assignment | first semester
119
Networking Assignment | first semester
120
Networking Assignment | first semester
121
Networking Assignment | first semester
122
Networking Assignment | first semester
123
Networking Assignment | first semester
124
Networking Assignment | first semester
125
Networking Assignment | first semester
126
Networking Assignment | first semester
127
Networking Assignment | first semester
Use critical reflection to evaluate own work and justify valid conclusions.
As per the scenario, as an IT officer, I have designed and implemented a network system for the
new branch of NIC Asia bank located in Gauradaha. For the effectiveness of the network system,
first I designed the network system and then made plans for the appropriate network. In the given
task, I have mentioned the positive aspects as well as the negative aspects of the network system.
I further provided recommendation and feedback form in above tasks.
I chose peer-to-peer network architecture and cloud computing for the network system of NIC
Asia bank. The setup cost of peer-to-peer architecture is low and it is easy to install. It also makes
data transferring easy. Cloud computing helps to provide backup in the network. It helps in clearing
up storages spaces in individual PCs and helps to boost up their performance.
128
Networking Assignment | first semester
According the feedback, low range of security is used in the network system of the NIC Asia bank.
So, I have chosen higher security system using NAT and port security. NAT is used to hide the IP
address and single IP is applicable for entire PC.
At first, low range of devices are used in the network system as per the received feedback. I have
selected devices of higher range. I chose the rack server which would be suitable for the given
scenario. Rack server is reliable, effective consumes less space and power. On rack sever, data is
stored in two or more than two servers. There is less chance of data loss because if one HDD is
corrupted, it automatically transfers the server to the next HDD.
After I was done with necessary hardware/software changes, I implemented the design on cisco
packet tracer. After creating the network, I did necessary testing. First, I did DHCP server testing.
I checked on every PC to check whether the IP addresses are assigned automatically or not. Then,
I performed DNS testing to check if webpage can be accessed. After that, I performed email testing
to see if mails can be forwarded to the destination. telnet provides remote access to all PC to the
administrator. I did Routing testing to test ping to another PC. VPN creates secret tunnel and
firewall ensures denied network cannot access internal network. the positive aspects of the network
are implemented on the design. The negative aspect is that it costs more than normal PC and server.
Conclusion
In conclusion, I have designed a networking system for the NIC Asia bank as per the given
scenario. I have tested all the necessary steps to make it be reliable and efficient.
129
Networking Assignment | first semester
References
Types of Computer Network: What is LAN, MAN and WAN (2021). Available at:
https://www.guru99.com/types-of-computer-network.html (Accessed: 10 August 2021).
130
Networking Assignment | first semester
What is a Campus Area Network (CAN)? - Definition from Techopedia (2021). Available at:
https://www.techopedia.com/definition/25931/campus-area-network-can (Accessed: 10 August
2021).
Cluster Computing: Definition, Types, Advantages & Applications (2020). Available at:
https://www.watelectronics.com/cluster-computing-architecture-its-types/ (Accessed: 11 August
2021).
131
Networking Assignment | first semester
What is Network Topology? Definition and FAQs | OmniSci (2021). Available at:
https://www.omnisci.com/technical-glossary/network-topology (Accessed: 15 August 2021).
Computer Network Topology - Mesh, Star, Bus, Ring and Hybrid (2019). Available at:
https://beginnersbook.com/2019/03/computer-network-topology-mesh-star-bus-ring-and-hybrid/
(Accessed: 15 August 2021).
132
Networking Assignment | first semester
Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter) -
GeeksforGeeks (2015). Available at: https://www.geeksforgeeks.org/network-devices-hub-
repeater-bridge-switch-router-gateways/ (Accessed: 19 August 2021).
(Services, P. (2021) What Is Wi-Fi? - Definition and Types, Cisco. Available at:
https://www.cisco.com/c/en/us/products/wireless/what-is-wifi.html (Accessed: 19 August 2021))
133
Networking Assignment | first semester
Blade Servers vs Rack Servers vs Tower Servers | ServerWatch (2020). Available at:
https://www.serverwatch.com/hardware/blade-servers-vs-rack-servers/ (Accessed: 20 August
2021).
134