Documente Academic
Documente Profesional
Documente Cultură
CONTENTS AT GLANCE
1. Introduction 2. Project Layout 3. Hardware & Software Requirements 4. Installation of server 2003 standard edition 5. Installation of Active Directory 6. Installation of DNS & configuring it 7. Installation of Additional domain server 8. Configuration of client computers 9. Creation of users 10.Applying permission on users via organizational unit 11.Installation of IIS service 12.Installation of FTP server 13.Router configuration (a) Configuration of Srinagar router (b) Configuration of Budgam router (c) Configuration of Baramulla router (d) Configuration of Anantnag router (e) Configuration of Jammu router
PROJECT LAYOUT
INTRODUCTION
Our project is WAN infrastructure management or simply Networking of J&K Bank. J&K Bank is one of the prominent financial Institution of Jammu & Kashmir having branches all over India. J&K bank Headquarter is connected to its branches & other important financial institutions for smooth functioning & convenience clients. Why networking in Banks ? It is not just that use networks. A lot of business do . However one example of why a bank uses networks is, say you go & open account. For you to be able withdraw money from a different town/city, that would mean (without networks) somebody is going to have to call every bank & give your details & then every time you lodge or take out money they have to call all the banks again to keep them up-to- date on your account. With networks,every bank can see your account ,what is in your account and it saves having to get somebody call other banks every time you make a withdrawal. Computerization has revolutionized the banking industry. The advent of the usage of computers has enormously increased the banking capabilities of the banks and they are able to offer better and wider range of services to their customers. Internet banking, mobile banking, ATMs etc are all the fruits of computerization of the banking industry. Banks are able to expand at a great rate and offer services to more and more customers because of the use of computers . We have installed two servers in the headquarter of J&K Bank,one acts as parent domain (jkbank) and other one as additional domain (nim.jkbank), restrictions have been applied on the users . Besides, FTP and Web server have been installed . Each router is connected via internet to the headquarter.
NETWORKING Network: A group or a collection of two or more computers, printers, routers, switches, systems linked together so that they are able to communicate with each other using some transmission media such as wires, cables, fibre,etc. Types of Networks There are Four basic types of networks currently in existence 1.Local Area Network (LAN) 2.Wide Area Network (WAN) 3.Metropolitan-area Network (MAN) 4.Home-area Network (HAN)
Wide Area Networks (WAN) A Wide Area Network (WAN) interconnects LANs. It is not restricted to a particular geographic area and may be interconnected around the world. Third party network is involved. They are characterized by the following: Multiple interconnected LANs Generally more expensive technology More sophisticated to implement than LANs Exist in an unlimited geographic area Less error resistance due to transmission travel distances
Metropolitan-area Network (MAN) A MAN is a network that connects LANs and/or buildings in an area that is often larger than a campus. For example, a MAN might be used to connect a companys various offices within a metropolitan area via the services of a telecom provider. Home Area Networks (HAN) A HAN is a network contained within a user's home that connects a person's digital devices, from multiple computers and their peripheral devices to telephones, VCRs, televisions, video games, home security systems, "smart" appliances, fax machines and other digital devices that are wired into the network.
Networking devices There are numerous devices associated with data information flow across a network. When adjoined, they create the infrastructure of a functional network. These devices include: Repeaters Bridges
Hubs
Switches
Routers
Repeaters Repeaters, located within the physical layer of a network, regenerate and propagate signals from one to another. They do not change any information being transmitted, and they cannot filter any information. Repeaters help to extend the distances of networks by boosting weak signals.
Bridges Bridges are intelligent repeaters. They regenerate transmitted signals, but unlike repeaters, they can also determine destinations. Hubs Hubs connect all computer LAN connections into one device. They are nothing more than multiport repeaters. Hubs cannot determine destinations; they merely transmit to every line attached in a half-duplex mode.
Routers Routers are a step up from bridges. They are able to route and filter information to different networks. Some routers can automatically detect problems and redirect information around the problem area. These are called "intelligent routers."
Switches Switches connect all computer LAN connections, the same as hubs do. The difference is that switches can run in full-duplex mode and are able to direct and filter information to and from specific destinations
NETWORK TOPOLOGIES
The Topology refers to a map of the network ( logical or physical )The physical topology of a network refers to the configuration of cables, computers, information between workstations.The following are physical topologies used in networks. Linear Bus Star Star-Wired Ring Tree
Linear Bus Architecture In a Linear bus topology a single cable connects each workstation in a linear, daisy-chained fashion. Signals are broadcasted to all stations, but stations only act on the frames addressed to them.
Star topology
In a star topology, each station is connected to a central hub or concentrator that functions as a multi-port repeater. Each station broadcasts to all of the devices connected to the hub. Physical LAN topologies are usually characterized as either bus or ring. The protocols used with star configurations are usually Ethernet or Local Talk. Token Ring uses a similar topology, called the star-wired ring.
Easy to detect faults and to remove the failed nodes or broken cables.
Ring Architecture
In a ring topology unidirectional links connect the transmit side of one device to the receive side of another device.Devices transmit frames to the next device (downstream member) in the ring.
Star-Wired Ring
A star-wired ring topology may appear (externally) to be the same as a star topology. Internally, the MAU (multistation access unit) of a star-wired ring contains wiring that allows information to pass from one device to another in a circle or ring. The Token Ring protocol uses a star-wired ring topology. Tree Topology A tree topology combines characteristics of linear bus and star topologies. It consists of groups of star-configured workstations connected to a linear bus backbone cable (See fig). Tree topologies allow for the expansion of an existing network, and enable schools to configure a network to meet their needs
Logical topologies
Logical topologies are of two types: 1.Workgroup 2.domain
Workgroup
A workgroup is a logical group of computers which is characterized by a decentralized security and and administration model. Authentication provided by a local account database Security Accounts Manager (SAM) A simple grouping of computers, intended only to help users find such things as printers and shared folders within that group. Workgroups in Windows do not offer the centralized user accounts and authentication offered by domains. Limitations Users need unique accounts on each workstation Users manage their own accounts (security issues) Not very scalable
Domain
A domain is a logical group of computers which is characterized by centralized authentication and administration Authentication provided through centralized Active Directory Active Directory database can be physically distributed across domain controllers.Requires at least one system configured as a domain controller
The bits in the first octet identify the address class. The router uses the first bits to identify how many bits it must match to interpret the network portion of the address
Class D addresses include the following: Range of network numbers: 224.0.0.0 to 239.255.255.255
Subnetting:
Subnetting an IP network is to separate a big network into smaller multiple networks for reorganization and security purposes. All nodes (hosts) in a subnetwork see all packets transmitted by any node in a network. Performance of a network is adversely affected under heavy traffic load due to collisions and retransmissions. Subnetting is also called as FLSM (Fixed Length Subnet Mask) Subnetting can be done in three ways. Requirement of Networks Requirement of Hosts Cisco / Notation
How subnet mask works: IP Address Subnet Mask ANDING PROCESS : 192.168.1.1 = 11000000.10101000.00000001.00000001 : 192.168.1.1 : 255.255.255.0
======================================= The output of an AND table is 1 if both its inputs are 1. For all other possible inputs the output is 0.
ETHERNET CABLE
We can find bulk supplies of ethernet cable at many computer stores or most electrical or home centers. You want UTP (Unshielded Twisted Pair) ethernet cable of at least Category 5 (Cat 5). Cat 5 is required for basic 10/100 functionality, you will want Cat 5e for gigabit (1000BaseT) operation and Cat 6 or higher gives you a measure of future proofing. You can also use STP (Shielded Twisted Pair) for extra resistance to external interference but I won't cover shielded connectors. Bulk ethernet cable comes in many types, there are 2 basic categories, solid and braided stranded cable. Stranded ethernet cable tends to work better in patch applications for desktop use. It is more flexible and resilient than solid ethernet cable and easier to work with, but really meant for shorter lengths. Solid ethernet cable is meant for longer runs in a fixed position. Plenum rated ethernet cable must be used whenever the cable travels through an air circulation space. For example, above a false ceiling or below a raised floor. It may be difficult or impossible to tell from the package or labelling what type of ethernet cable it is, so peal out an end and investigate. Here is what the internals of the ethernet cable look like:
Inside the ethernet cable, there are 8 color coded wires. These wires are twisted into 4 pairs of wires, each pair has a common color theme. One wire in the pair being a solid or primarily solid colored wire and the other being a primarily white wire with a colored stripe (Sometimes ethernet cables won't have any color on the striped wire, the only way to tell which is which is to check which wire it is twisted around). Examples of the naming schemes used are: Orange (alternatively Orange/White) for the solid colored wire and White/Orange for the striped cable. The twists are extremely important. They are there to counteract noise and interference. It is important to wire according to a standard to get proper performance from the ethernet cable. The TIA/EIA-568-A specifies two wiring standards for an 8-position modular connector such as RJ45. The two wiring standards, T568A and T568B vary only in the arrangement of the colored pairs. Tom writes to say "...sources suggest using T568A cabling since T568B is the AT&T standard, but the US Government specifies T568A since it matches USOC cabling for pairs 1 & 2, which allows it to work for 1/2 line phones...". Your choice might be determined by the need to match existing wiring, jacks or personal preference, but you should maintain consistency. I've shown both below for straight through cabling and just T568B for crossover cabling
T-568A Straight-Through Ethernet Cable
The TIA/EIA 568-A standard which was ratified in 1995, was replaced by the TIA/EIA 568-B standard in 2002 and has been updated since. Both standards define the T-568A and T-568B pin-outs for using Unshielded Twisted Pair cable and RJ-45 connectors for Ethernet connectivity. The standards and pin-out
specification appear to be related and interchangeable, but are not the same and should not be used interchangeably.
T-568B Straight-Through Ethernet Cable
Both the T-568A and the T-568B standard Straight-Through cables are used most often as patch cords for your Ethernet connections. If you require a cable to connect two Ethernet devices directly together without a hub or when you connect two hubs together, you will need to use a Crossover cable instead.
RJ-45 Crossover Ethernet Cable
A good way of remembering how to wire a Crossover Ethernet cable is to wire one end using the T-568A standard and the other end using the T-568B standard. Another way of remembering the color coding is to simply switch the Green set of
wires in place with the Orange set of wires. Specifically, switch the solid Green (G) with the solid Orange, and switch the green/white with the orange/white. Basic Theory:
By looking at a T-568A UTP Ethernet straight-thru cable and an Ethernet crossover cable with a T-568B end, we see that the TX (transmitter) pins are connected to the corresponding RX (receiver) pins, plus to plus and minus to minus. You can also see that both the blue and brown wire pairs on pins 4, 5, 7, and 8 are not used in either standard. What you may not realize is that, these same pins 4, 5, 7, and 8 are not used or required in 100BASE-TX as well. So why bother using these wires, well for one thing its simply easier to make a connection with all the wires grouped together. Otherwise you'll be spending time trying to fit those tiny little wires into each of the corresponding holes in the RJ-45 connector.
2- You can press F6 if you need to install additional SCSI adapters or other massstorage devices. If you do you will be asked to supply a floppy disk with the drivers and you CANNOT browse it (or a CD for that matter). Make sure you have one handy.
4- Select or create the partition on which you will install Windows Server 2003.
5- Select a file system for the installation partition. After you create the partition on which you will install Windows Server 2003, you can use Setup to select the file system with which to format the partition. Windows Server 2003 supports the NTFS file system in addition to the file allocation table (FAT) and FAT32 file systems.
6- Setup will then begin copying necessary files from the installation point (CD, local I386 or network share).
7- The computer will restart in graphical mode, and the installation will continue
8- Now the setup process reboots and loads a GUI mode phase
3-In the Operating System Compatibility windows read the requirements for the domain's clients and if you like what you see - press Next
6-Enter the full DNS name of the new domain ,this must be the same as the DNS zone .click next
8- Accept the Database and Log file location dialog box (unless you want to change them of course). The location of the files is by default %systemroot%\NTDS, and you should not change it unless you have performance issues in mind. Click Next.
4- In Components, select the Networking Services check box, and then click Details. 5- Now click on Next.
6- In Subcomponents of Networking Services, select the Domain Name System (DNS) check box, click OK, and then click Next.
7- If you are prompted, in Copy files from, type the full path of the distribution files, and then click OK.
8- Insert windows 2003 cd in to CD-ROM and select the desire file. 9- Now click on finish.
Configuration of DNS 1- click on start and go to All Programs. 2- Now go to Administrative Tools and click on DNS
3- In the DNS wizard, click on plus sign of server name. 4- Now Right click on Forward Lookup zone. 5- Click on New Zone
10- Now click on Next 11- Now again click on Next. 12- click on finish
INSTALLATION OF ADDITIONAL DOMAIN (ADC) Additional Domain controller is the domain which provide the fault tolerance.If you already have one domain controller in a domain, you can add additional domain controllers to the domain to improve the availability and reliability of network services. Adding additional domain controllers can help provide fault tolerance, balance the load of existing domain controllers, and provide additional infrastructure support to sites. More than one domain controller in a domain makes it possible for the domain to continue to function if a domain controller fails or must be disconnected. Steps of installation of ADC 1- Click Start, point to Run and type "dcpromo". 2- The wizard windows will appear. Click Next.
4- Choose Additional Domain Controller for an existing domain and click Next
6- In the Network Credentials window enter the username and password for a Domain Admin in the domain you're trying to join. also enter the full DNS domain name. Click Next.
7- Accept the Database and Log file location dialog box (unless you want to change them of course). The location of the files is by default %systemroot%\NTDS, and you should not change it unless you have performance issues in mind. Click Next.
8- Accept the Sysvol folder location dialog box (unless you want to change it of course). The location of the files is by default %systemroot%\SYSVOL, and you should not change it unless you have performance issues in mind. This folder must be on an NTFS v5.0 partition. This folder will hold all the GPO and scripts you'll create, and will be replicated to all other Domain Controllers. Click Next.
9- Enter the Restore Mode administrator's password. Whatever you do remember it! Without it you'll have a hard time restoring the AD if you ever need to do so. Click Next.
10- Review your settings and if you like what you see - Click Next
11- See the wizard going through the various stages of installing AD. Whatever you do - NEVER click Cancel!!! You'll wreck your computer if you do. If you see you made a mistake and want to undo it, you'd better let the wizard finish and then run it again to undo the AD. 12- If all went well you'll see the final confirmation window. Click Finish.
13- You must reboot in order for the AD to function properly. Click Restart now.
Creation of users:
1.Open Active Directory by type the dsa.msc command at Run menu
Control the computer settings. - Configure DNS client settings. - Configure the time server client computers use. Distribute software. - Force software installation. - Allow for easy optional software installation through Add/Remove Programs. POLICY SETTINGS Policy settings via organizational unit can be of following types: Registry-based Software installations and repairs Folder redirection and offline storage Disk quotas Internet Explorer configuration
- Centralized backup. - Centralized security enforcement. Steps of creating organizational unit: 1- Open Active Directory, right click on Domain Server. 2- Click on New, and Click on Organizational Unit.
Assigning policies to users: 1- Open Active Directory. 2- Right Click on OU and click on Properties
INSTALLATION OF IIS SERVER. 1- open add/remove program from the control panel. 2- Now click on add/remove windows component
Configuration of IIS.
1- Now after installing IIS, Inetpub folder created in C: drive by default.
6- Click on plus sign of web site and delete the default web site.
7- right click on web site. 8-Now point the mouse to the New and click on web site
10- Type the description into Description box. 11- click on next
12- Assign the IP address through which you want to access the web site & click on next.
16- Now configure the IP address at the client computer.\ 17- Now type the following path to the address bar of the internet explorer. http://ip address of the Server Computer/name of file
7- Now check in to File Transfer Protocol Service and now click on OK.
2- Start Internet Information Services Manager or open the IIS snap-in. 3-Expand Server_name, where Server_name is the name of the server
7- Click to select the Allow Anonymous Connections check box (if it is not already selected), and then click to select the Allow only anonymous connections check box Now click on OK.
9- Click to select the Read and Log visits check boxes (if they are not already selected), and then click to clear the Write check box (if it is not already cleared). 10- Click on OK.
11- Quit Internet Information Services Manager or close the IIS snap-in. 12- Now open the Internet explorer, and type the following path. ftp://ip Address
CONFIGURATION OF ROUTERS
Configuration of headquarter(Srinagar) router Router(config)#router rip Router(config router)#version 2 Router(config router)# network 10.10.10.0 Router(config router)# network 100.100.100.0 Router(config router)#no auto summary
Configuration of Baramulla router Router(config)#router rip Router(config router)#version 2 Router(config router)# network 20.20.20.0 Router(config router)# network 110.110.110.0 Router(config router)#no auto summary
Configuration of Budgam router Router(config)#router rip Router(config router)#version 2 Router(config router)# network 30.30.30.0 Router(config router)# network 120.120.120.0 Router(config router)#no auto summary
Configuration of Anantnag router Router(config)#router rip Router(config router)#version 2 Router(config router)# network 40.40.40.0 Router(config router)# network 130.130.130.0 Router(config router)#no auto summary
Configuration of Jammu router Router(config)#router rip Router(config router)#version 2 Router(config router)# network 50.50.50.0 Router(config router)# network 140.140.140.0 Router(config router)#no auto summary
SUMMARY
Today computer technology has permeated almost every sphere of modern man. Networking, as its important part has found its way in almost every modern establishment like offices, universities, government sectors etc and has made administration quite efficient. Our project is on WAN infrastructure management or simply networking of J&k bank. J&k bank is one of the prominent financial institutions of Jammu & Kashmir having branches all over India. J&K bank headquarter is connected to its branches and other important financial institutions for smooth functioning and convenience of clients.
BIBLIOGRAPHY
Wikipedia Data communications by Farouzan Data communications by Stallings www.google .com amazon.com computer networks.