Sunteți pe pagina 1din 27

Professional Practices 2018

Task 1/ P1
Discuss the benefits and constraints of different network types and standards.

Introduction
In this task I am going to discuss the advantages and disadvantages of different network types and
standards. Like Peer based, Client-server, cloud, cluster, centralized and virtualized network.

Peer to Peer network:


The network where different computers are connected with each other but none of the computer
occupies a private position.

Advantage of peer to peer network:


It is easier to set up and less expensive. All of the computers act as both server and client where all
nodes are act as server as well as client. Therefore there is no need of dedicated server.

Disadvantage of peer to peer network:


In peer to peer network, Network security has to be applied to each computer separately. Centralized
server is not available to manage and control access of data. In this network computer can be
accessed anytime. Users have to use separate password on each computer in the network.

Client-Server network:
A computer network in which one centralized server is a hub to which many client computers are
connected.

Advantage of client-Server network:


All rights and resources allocation is done by servers. Management of files becomes easy because all
files are stored at the same place. As all data are stored in server it’s easy to make backup of it.
Server can be accessed remotely.

Disadvantage of client-server network:


Too many requests from clients may lead to congestions. If there is any server failure in the network
whole network goes down. It is very expensive and cost taking to install and manage this type of
computing. There will be need of professional IT people to maintain the servers and other technical
details of network.

Centralized Network:
It is a type of network in which all computers are connected with main server which is
responsible for all communication within a network.
Subash Poudel (HND / first Semester)
1
Professional Practices 2018

Advantage of centralized Network:


In this network security can be deployed from the main server or central server. The data loss or data
error can be recollected by backup system. Every data resources package or file can be transmitted
easily with each other.

Disadvantage of centralized Network:


In this network there should be backup system. Main server failure can disrupt functioning of entire
network. The managing and handling should be done regularly.

Virtualizes Network:
The process of splitting the physical network entities routers, switch, firewall, etc. into multiple
logical network entities separating the users traffic from different instances.

Advantage of virtualize network:


It is easy to configure and to use then other network system. Files and resources can be remotely
accessed from one computer to another within virtualized network. It can be upgraded and
components can be added as the requirements of the users.

Disadvantage of virtualize network:


It is hard for checking and managing of resources that are available. The performance of network is
affected by the slow internet connection. It cannot handle the traffic more efficiently.

Cloud Network:
It is a cloud based networking which uses resources from centralized third party provider using Wide
Area Networking.

Advantage of cloud network:


Users and data can be added with more speed. It has good backup system so the data loss can be
recovered easily and quickly. Users can access the data more easily.

Disadvantage of cloud network:


It requires high speed network connection for effective sharing of data and resources. Privacy of data
is very weak then other network.

Cluster Network:
It is a group of servers and the resources that act like a single system which enable the high
availability. It is also used to control each node’s status and communicate with each other.

Subash Poudel (HND / first Semester)


2
Professional Practices 2018

Advantage of cluster network:


It can access and transfer data more quickly and efficiently. Configuration process is easier in this
network type. It has the feature of the load balancing and the errors in any computers can be found
and fixed. The network fabric redundancy in this network is good as it is acquired by LACP and
IPMP functions.

Disadvantage of cluster network:


Expensive and only higher organization or the companies can afford it. The errors that may arise
cannot be handled easily. Administrator has to keep an eye on the server every time as it has poor
management system.

TCP/IP Model:
It is a combination of two separate protocols transmission control protocol and internet protocol.
TCP/IP is a set of protocols governing communication among all computers on the internet. This
model divides networking functions into various layers. The layers are :

1. Application Layer
2. Transport Layer
3. Internet Layer
4. Network Access Layer

Advantage of TCP/IP Model:


It can be used to set up connections easily between different types of servers and computers. It
supports for name and address resolution services including DHCP, DNS and WINS. It has scalable
client/server architecture and operates independently of the OS(Operating System).

Disadvantage of TCP/IP:
It is difficult to establish and manage. It cannot be used in any other application. It is hard to replace
protocols.

OSI Model:
The Open System Interconnection (OSI) model is a reference tool for understanding data
communications between any two networked systems. There are 7 layers they are :

1. Physical Layer
2. Data Link Layer
3. Network Layer

Subash Poudel (HND / first Semester)


3
Professional Practices 2018

4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer

Advantage of OSI Model:


IT Help users understand the big picture of networking and to understand how hardware and
software elements function together. Makes troubleshooting easier by separating networks into
manageable pieces. It is more secure and adaptable.

Disadvantage of OSI Model:


There is interdependence among various layers. There is no any particular protocol is defined. There
is some duplication in services at various layers.

IEE 802.X:
There are fundamentally six sorts of network standards created IEEE i.e. 802.1, 802.2 etc. IEEE
802.1 is for most part related to arrange administration and IEEE 802.2 is identified with OSI Model.
Usually IEEE 802 shows the services, features and protocols for network.

Conclusion:
Different kinds of network and other network standards have their own significance and activity in
their particular fields. The TCP/IP model and OSI model is the portion of the reference or examined
as abstract model for the network standards. As network architecture reflects network system design,
TCP/IP and OSI model represent the responsibility between network devices for communication in
the architecture.

Task 2 [P2]

Explain the impacts of network topology, communication and bandwidth requirements.

Introduction

A network topology is the arrangement of a network, including its nodes and connecting lines. It is
the topological structure of a network. Network topology is the schematic description of a network
arrangement, connecting various nodes (sender and receiver) through lines of connection. Network
topology explain how the different nodes are kept and interrelated with each other. Consecutively,

Subash Poudel (HND / first Semester)


4
Professional Practices 2018

network topology defines how the data is moved between these knots. Topology is a way in which
the network of computers is attached. Each topology is suited to exact tasks and has its own
advantages and disadvantages. Selection of topology is required according to the need, rate of data
transfer required, response time and cost. There are two ways of describing network geometry: the
physical topology and the logical (signal) topology.

There are different types of network topology. They are as listed below.

1. Bus Topology
2. Star Topology
3. Ring Topology
4. Mesh Topology
5. Tree Topology
6. Hybrid Topology
1. Bus Topology:
Bus topology is a network kind in which every computer and network device is linked to
single cable. When it has exactly two endpoints then it is called a linear bus topology. Many
of the networking values that we’re going to work with will use the bus topology whether
physically or logically. On a bus topology all data runs on a central wire. Each and every host
connected to that wire can communicate straight with any other host connected to the wire.
Now days we don’t see a lot of networks that are currently using physical bus topology.
Somehow, we will find many networks that still operate logically as a bus. Fig 1 shows about
bus topology.

Impacts of Bus Topology


Every device is connected to a single cable so it transmits
data only in one route. It is used in small networks. The
cable required is least associated to other network
topology. Cable has a limited length. If cable fails then
whole network fails. It is slower than a ring topology. If
network traffic is heavy or bulges are more the
presentation of the network decreases.

2. Star Topology:

Subash Poudel (HND / first Semester)


5
Professional Practices 2018

In this kind of topology, all the devices and hosts are connected with single host with cable .
This hub is the central device and all others device are connected to the central device. All
clients on the network are connect to the hub with a network cable and. If one device needs to
send data to some other devices connected to a network, it will send the data to the central
connecting device. The central connecting device then replicates the information and forwards
it on to the appropriate host. Fig 2 shows about star topology.
Impacts of Star Topology

Every node has its own dedicated connection to the hub. Hub acts as a
repeater for data flow. It can be used with twisted pair, optical fiber or
coaxial cable. It has fast performance with few nodes and low network
traffic. Hub can be upgraded easily. It can be easily modified, setup, and
troubleshoot. Installation cost is high. If hub fails then all network is
stopped because all the nodes depend on the hub. The performance is
based on the hub that is it depends on its capacity.

3. Ring Topology
There is no any central connecting medium in ring topology. It is called ring topology because
it forms a ring as each computer is connected to another computer, with the last one connected
to the first. Exactly two neighbors’ for each drive. Fig 3 shows about the ring topology.

Impacts of Ring Topology


The transmission is unidirectional, but it can be made bidirectional by having 2
connections between each Network node, called Dual Ring
Topology. In dual ring topology, two ring networks are formed,
and data flow is in opposite direction in them. Also, if one ring
fails, the second ring can act as a backup, to keep the network up.
Data is transferred in a sequential manner that is bit by bit. Data
transmitted, has to pass through each node of the network, till the
Fig: 1
destination node. In ring topology, installation is cheap and
troubleshooting is difficult. Adding or deleting the computers disturbs the network activity.
Transmitting network is not affected by high traffic or by adding more nodes, as only the

Subash Poudel (HND / first Semester)


6
Professional Practices 2018

nodes having tokens can transmit data. The whole network gets disturbed when there’s failure
of computer.

4. Mesh Topology

Mesh topology is a point-to-point connection to other nodes or devices. All the network nodes
are connected to each other. Let’s take a look at example with five hosts. This is also known
as a full mesh topology. And if we imagine that we have 10 hosts. Things would get
complicated really fast. Because of that, this topology is more theoretical, but can be
implemented more easily in wireless networking. Fig 4 shows about Mesh Topology.

Types of Mesh Topology

 Partial Mesh Topology


 Full Mesh Topology

Impacts of Mesh Topology


Fig: 2

Each connection can carry its own data load. It is fully


connected, also it is robust. It isn’t flexible. We can easily diagnosed fault in mesh topology. It also
provides security and privacy. The installation and configuration in mesh topology is difficult. The
cabling cost is high also bulking wiring is required.

5. Tree Topology

Tree topology has a root node and all other nodes are connected to it forming a hierarchy. It is
also called hierarchy topology. It should at least have three levels to the hierarchy.

Impacts of Tree Topology

Tree topology is used in Wide Area Network. It is ideal if


workstations are located in groups. There is extension of bus and star
topologies. The expansion of nodes is possible and easy. Tree
topology is easily managed and maintained. The error detection is

Subash Poudel (HND / first Semester)


Fig: 3 7
Professional Practices 2018

easily done in this topology. Tree topology is heavily cabled and it is costly. If central hub fails, then
network fails. Also, If more nodes are added in this topology, maintenance is difficult.

6. Hybrid Topology
Hybrid Topology is the combination of different topologies. It is two different types of
topologies which is a mixture of two or more than two topologies. For example If in an office
in one department ring topology is used and in another star topology is used, connecting these
topologies will result in Hybrid Topology (ring topology and star topology). Fig 6 is the
example of hybrid topology.
Impacts of Hybrid Topology

Hybrid Technology is a combination of two or more


topologies. It is reliable as error detecting and
troubleshooting is easy. It is effective and flexible. It is
scalable as its size can be increased easily. Hybrid
topology is complex in design and it is costly.

Fig: 4

Conclusion:
Network topology is the arrangement and layout of network that determines how the network’s
devices are connected. So, without the proper knowledge of various topologies the effective network
can never be build. As all the topologies have their respective positive and negative impact so the
user has to choose carefully the effective one that meets the requirement efficiently. Without the
appropriate topology, the network may not meet the requirements of the organization.

Task 4 / P3
Discuss the operating principles of networking devices and server types.

Introduction

In this task I have described various network devices and server types that are very essential for
using internet. Network devices are used to share or exchange information in a high speed between

Subash Poudel (HND / first Semester)


8
Professional Practices 2018

the computer networks. There are many devices in network to connect with internet which helps in
flow of data and files in a high speed and people use different devices for connecting to internet.
Now days, using internet is very important so, using networking devices are very common to use
network internet. There are various different servers which are used in using internet in our daily life.

Types of networking devices

Server

A server is computer that provide data to the another computers[ CITATION htt184 \l 1033 ]. Server
is a sample of computer program that accept and response to all massages by another program. In
network connection server process requested data and delivers it. It is responded via desktop to the
database that has characteristic of server. All business connects all of their desktop computers to the
server.

Hub

Hub is the most basic networking device that connects multiple computers or other network devices
together [ CITATION htt185 \l 1033 ]. In my view it is the network device which helps to multiple
computer are connected together. It is also known as network hub where hubs are devices commonly
use to connect segments of a LAN. Hub takes the data that comes into the ports and sends out all the
other ports in the hub.

Router:

A router is WAN device (Wide area network) and it connects two or more networks. Router connects
two or more that two networks so, it is called Inter-Networking device. It works on bases of OSI
model network layer and it is called layer third device. In router every port has its own broadcast
domain. Router uses IP address and transfer data in the form of packets. Router is comparatively
slow than that of switch.

Switch

Switch is the piece of hardware on network that allows communication between the devices within
that network[ CITATION htt187 \l 1033 ]. It is a computer networking device that connects devices
together on the computer using the packets switch. It has another word which is switching hub. It
connects various network devices together. In comparison, Switches are not as good as a router in

Subash Poudel (HND / first Semester)


9
Professional Practices 2018

limiting broadcast. Also, switches are very expensive and it is difficult to find the network problems
through a switch.

Multi-layer switch:

“A multilayer switch is a network device that has the ability to operate at higher layers of the OSI
reference model, unlike the Data Link Layer (DLL) traditionally used by switches. A multilayer
switch can perform the functions of a switch as well as that of a router at incredibly fast speeds. A
switch traditionally inspects frames, while a multilayer switch inspects deeper into the protocol
description unit (at packet or even at segment level).” [ CITATION Tec3 \l 1033 ]. The design of the
multilayer switch is better than the router. With multiple layers we can easily get the functionality of
routing and switching linked and high output for access in a single box. Moreover, it also runs the
function of router and the switch.

Firewall

Firewall is the network security system that monitors control incoming and outgoing network traffic
and the devices. It is software or hardware maintained the security of a network. It obstructs
unofficial internet users from accessing private networks connected to the internet. It protects us
from different unwanted resources which are harmful for us.

HIDS

“[ CITATION Tec4 \l 1033 ]A host-based intrusion detection system (HIDS) is a system that
monitors a computer system on which it is installed to detect an intrusion and/or misuse, and
responds by logging the activity and notifying the designated authority”. If network based ISD
sensors fail to detect then host base system can detect attacks. This system uses system logs
containing event that have actually occurred means they can find out whether an attack or not.

HIDS hard to manage, as information must be configured and it manage for all hosts. It can be
disabling by certain denial-of-service attacks.

Repeater:

A repeater is an electronic device which obtains signal and retransfer it at a higher level power than
previous. It is used for originating or replicating a signal. It also regenerate analog or digital signal
warped by transmission loss and works at first layer of OSI model. Repeaters can be classified in

Subash Poudel (HND / first Semester)


10
Professional Practices 2018

analog and digital repeaters. Analog repeaters only amplify the signal and digital repeaters can
reconstruct a signal to near its original quality.

Bridges

Bridge is a type of computer network device that provides interconnection which other bridge
network that use the same protocol[ CITATION htt188 \l 1033 ]. In my view, it is a device used to
connect a multiple communication networks or network segments. It is also known as Layer 2
switches. Extensions diminish the measure of activity on a LAN by partitioning it into two
fragments. Extensions review approaching activity and choose whether to forward or dispose of it.

Access point (wireless/wired)

“An access point is a device that creates a wireless local area network, or WLAN, usually in an
office or large building. An access point connects to a wired router, switch, or hub via an Ethernet
cable, and projects a Wi-Fi signal to a designed area” [ CITATION LIN \l 1033 ]. In general access
point is a device such as a wireless router that permit wireless devices to connect to the network.

Wireless devices

Wireless devices host and control the wireless connection for laptop, tablets and other smart phones.
They are made using access points. It uses wireless data connection between networks and to enlarge
the range of router. Wireless devices escalate the flexibility and holds for most business.

Content filter

Content filtering works by if the strings of characters match and after the strings is equivalent, the
content is not allowed through. Content filters are generally part of Internet firewalls. In such a usage
content filtering is performing a security purpose, however content filtering is also used in
implementing company policies related to information system usage. It helps in decreasing the
amount of hacker, virus and other possible attracts by the content-filtering system. Contents filter is
very beneficial because it helps to reduce the ability and help to cut down on phone cells. It
maintains high level networks protection.

Load balancer

Load balancer is the device that acts as a reverse proxy and distributes network or application traffic
across a number of servers[ CITATION htt189 \l 1033 ]. It automatically distributes traffic across
many target with the help of network load balancer using complex routing protocols and also it is the

Subash Poudel (HND / first Semester)


11
Professional Practices 2018

practice of allocating a workload across multiple computers. It helps in the business and also
increases the external traffic. We can add or delete sample as per our need without causing any
separation in incoming traffic.

Modem

Modem is a device or program that authorized a computer to transmit data over, like telephone or
cable lines. Modem can be defined as a hardware device that connects a computer and router in a
broadband network. It is useful in connecting LAN with the internet and has high speed that depends
on the cost. It also converts antonyms signals to digital signals and vice-versa. It can easily be
repaired. It acts just an interface between LAN and internet.

Packet Shaper

“Traffic Shaping, also known as “packet shaping,” is the practice of regulating network data transfer
to assure a certain level of performance, quality of services or return on investment”[ CITATION
Mar4 \l 1033 ]. “The practice involves delaying the flow of packets that have been designated as less
important or less desired than those of prioritized traffic streams” [ CITATION Mar2 \l 1033 ].

VPN Concentrator

A VPN concentrator is a type of networking device which provides or supply safe and secure
creation of VPN connections and delivery of messages between VPN nodes. It is specifically built
for creating and managing VPN communication infrastructures. It can establish and configure
tunnels and authenticate users. It also can assigns IP addresses to users. At last, it also encrypt and
decrypt data and ensure end-to-end delivery of data.

Types of Server

Web Server

A Web server is a program which uses HTTP (Hypertext Transfer Protocol) to perform the files


which form Web pages to users, in response to their requests, which are forwarded by their
computers' HTTP clients. Devoted computers and mechanism may be referred to as Web servers as
well.

File Server

Subash Poudel (HND / first Semester)


12
Professional Practices 2018

File Server is a server that helps in managing and sharing of files in computer as per the requirement
of clients. For transferring large files there should be high speed internet so that file can be shared in
evaluated time. Especially, Clients should proceed the data in their given time so file server helps to
transfer it as per their asked time.

Database server

Database is a place where data are stored in a manageable way which can be changed as per the user
command. For login into any server or application the database of the user is collected in such a way
that their information is kept whenever it is needed. By creating database, the users can login in into
their require server if there data is matched with data which is stored in that database. So, the data
management is done by the database server.

Virtualization

In virtualization one signal operating system can run different multiple operating system. one
computer can host different many other computers. Nowadays virtualization is used all over the
world. Every IT sector companies uses virtualization to do the different multiple works in a signal
computer.

Print Server

In this server all the printer is connected or linked to a single network. The main computer in this
server can access the printer from anywhere on that network. Print server is useful because printer
can be accessed by a computer and printing can be done easily without the help of other people. It
accepts client’s in order to print and after printing the requested data, clients can easily receive the
information about printing.

Conclusion

Eventually, all the networking devices and server type are very useful in networking. These
operating systems are useful in using internet all over the world. Every network devices are used to
connect or link with something that share files and data faster. For examples, hub, router, switch, etc.
are in networking devices and print server, file server are the server types.

Task5/P4

The interdependence of workstation hardware with relevant networking software.

Subash Poudel (HND / first Semester)


13
Professional Practices 2018

Roles of workstation:

S/ Devices Name Role of Device


N
1 Network Interface Card It helps to create connection between computer and network.
2 Network Printer It is use for printing propose.
3 Cables It is use to connect devices PCs with one another.
4 Connector It is use to connect CAT 5 or CAT 5e.
5 Router It is a gateway to forward data packet to network.
6 firewall It provide security form unauthorized user.
7 Memory It is for keeping data for future use.
8 Processor It is use for taking inputs and make the results.
9 I/O devices It is use to enter data and get the outcome or final results.
Roles of Networking software:

S/ Software Name Details


N
1 Network Operating System It helps to manage, control network user and other activities
that helps in effective sharing of data.
2 Client Operating system It helps to manage and control client computers.
3 Microsoft Offices It helps to make reports, put records and make presentations.
4 Web software Web developing software is used to develop website for our
IT company
5 Antivirus It Provide protect from virus and unauthorized activities.
6 SQL server SQL server helps to put records

The interdependence of workstation hardware with relevant networking software.

Hardware is any physical devices whereas software is a collection of code which instruct hardware
about what task to be done. Hardware and software both are interdependent and each of them should
work together to produce an output. If there is no support of any hardware, then the software cannot
be used. The hardware cannot perform its task without proper instructions. To perform given a task
the relevant software package has to be loaded into the hardware. The different software package can
be loaded on a hardware to run different jobs. We can say the hardware and software are the heart
and soul of a digital computer. For example, the monitor which allow us to read the text is a
hardware and the operating system by which that page runs is software.

Subash Poudel (HND / first Semester)


14
Professional Practices 2018

Task8/p5

Design a network system to meet a given specification.

Network is a group of computers or network devices for sharing the data that is stored in the
hardware and software. We can also use internet as example of network because it is used all over
the globe and connected millions of population. Here, We have to design a network diagram by using
Visio tool taking different servers like DC, DNS and Secondary DNS etc.

Subash Poudel (HND / first Semester)


15
Professional Practices 2018

Head office of Nepal


Access point
Bank Limited

Vpn server Firewall router


Switch

Printer Fax
dC Dhcp Rodc Wds
10.10.10.1 10.10.10.2 10.10.10.3 10.10.10.4

Client a Client b Client c


10.10.10.7 10.10.10.6 10.10.10.5
Dhcp
switch
1.1.1.1

Client a Client b Client c


1.1.1.2 1.1.1.3 1.1.1.4
Access point
Branch office

firewall router
switch

Dhcp Rodc Dc Wds printer


2.2.2.1 2.2.2.2 2.2.2.3 2.2.2.4

Client a Client b Client c


2.2.2.7 2.2.2.6 2.2.2.5

switch
router

Legend Client a Client b Client c


Legend Subtitle 5.5.5.2 5.5.5.3 5.5.5.4

Symbol Count Description


6 Switch
2 Wireless access point
2 Firewall
2 Printer
3 Router
12 Terminal
9 Server
1 Fax
1 Virtual server

Servers IP address Subnet marks DNS IP Gateway

Subash Poudel (HND / first Semester)


16
Professional Practices 2018

DHCP 10.10.10.1 255.0.0.0 - -

RODC 10.10.10.2 255.0.0.0 - -

WDS 10.10.10.4 255.0.0.0 10.10.10.1 -

DC 10.10.10.3 255.0.0.0 10.10.10.3 -

VPN Lan1:192.168.1.2 255.255.255.0 192.168.1.1 192.168.1.100


0 255.255.0.0
Lan2:172.16.1.50
IP Table OF Head Office:

IP Table OF Branch Office:

Servers IP address Subnet marks DNS IP Gateway

DHCP 2.2.2.1 255.0.0.0 - -

RODC 2.2.2.2 255.0.0.0 2.2.2.2 -

WDS 2.2.2.4 255.0.0.0 - -

DC 2.2.2.3 255.0.0.0 2.2.2.1 -

DHCP:

DHCP is also called as Dynamic Host configuration protocol ,which provide the different
range of IP address. Such as router, which distribute the different range of IP Address.

RODC:

It is also known as read only domain controller it is the type of domain controller which has
permission to only read the data. It is used in different organizations which need only read partitions.

WDS:

“Windows deployment services is a server role that gives administrators the ability to deploy
windows operating system remotely and it can be used for network-based installation to set up new

Subash Poudel (HND / first Semester)


17
Professional Practices 2018

computers so administrators do not have to directly install each operating system”[ CITATION Mar3
\l 1033 ].

DC:

“Domain is a server which includes the collection of users, groups, networks, and other network
devices or resources with common set of rules” [ CITATION Vin17 \l 1033 ]. Main function of DC
is to control all client computers and servers and manages the security.

DNS:

DNS is known for Domain Name System. It is a translation system that helps us to search the
internet using language which we are habitual. DNS sever translates the various IP address into the
user’s languages.

CDC (Child Domain Controller):

Child Domain is domain under the parent domain which is used in the branch offices in place of
Domain Controller. It also works as domain but the only difference is that, it works under Domain
controller.

VPN (Virtual Private Network):

Network Software is which is used to transfer data all around the network public networks. It allows
users to securely access the private network anywhere in the world.

Web Server:

Every time a client send command to a webserver it respond to server for starting the webpage that
client wants to start. It processes incoming network requests over the HTTP protocol.

Print Server:

A Print server is a server that can be accessed by any computer inside a network. It accepts the client
command to print and all the data is stored in print server while printing.

Network Devices:

Network devices are the components that are used to connect computers or any other electronic
devices together. Network devices I have used in above design air given below:

Subash Poudel (HND / first Semester)


18
Professional Practices 2018

Cable:

“A cable is one or more collection of wire covered inside the plastic, that transmit the data as well as
power from one network device to another”[ CITATION Com17 \l 1033 ]. It helps to transfer data
and power from one device to another device.

Firewall:

“Firewall is a method planned to control the unauthorized access to or from the private network”
[CITATION Ind \l 1033 ]. It helps to stop the unauthorized internet users from entering the private
network which is connected to internet. Main cause of using firewall in network is to protect private
file which filter unknown errors.

Router:

The device which distributes IP address automatically and manually to the users is known as router.
It provides data packets within a network. It keeps the records of users IP which is distributed by it.

Gateway:

“A gateway is a network node that connects two networks using different protocols together while a
bridge is used to join two similar of networks, a gateway is used to joint two dissimilar
networks”[ CITATION Mar3 \l 1033 ].
Switch:

It is a networking device which connects the devices within a computer network. Switch has only
one broadcast domain. It uses MAC address and transfer data in the form of frame. It is faster then
hub.

Conclusion:

In this task I have shown the network design of the main office and branch office. I have described
the servers and devices I have used in my design. And I also have shown different IP address of the
servers that I have used in my network.

Task 9/P6
Test and evaluate the design to meet the requirements and analyze user feedback.

Subash Poudel (HND / first Semester)


19
Professional Practices 2018

I have used different kind of devices and servers in my network. And here I will be Testing the
servers and evaluate and taken feedback from users to confirm that network system is usable or
unusable.

Testing table:

S/ what was tested expected output actual output comments


N
1. DHCP sever It should be able to set IP Since the DHCP scope The client
address automatically to is 1 to 60 that the requirements
all 50 clients. DHCP server will be against the
set to provide IP suitable IP
addresses to 50pc. address met.
2. DC(Domain It should be able to The DC will keep The client need
Controller) support user, store security and store against the
information and security information of 50 security policy
policy to all 50 clients clients. met.
3. WDS(Windows It should be able to install Since the DHCP scope The client can
Deployment windows operating system is 1 to 60, the WDS boot the network
Service) to all 50 clients can boot the network without OS.
without OS.
4. Print server It should be able to The print server will The client need
process print related jobs do print related job. the against
on the network of 50 pc suitable printer
met
5. Web server It should be able to form It will show web pages The client need
web pages to all 50 clients as client request. against web pages
using HTTP. display met.

I have checked all the server that I have used in my network design and mentioned on the table with
what was the expected result and what was actual result with remarks. And it meets all the
requirements to be used in Nepal Bank Limited.

Analyze user feedback:

I have Shown the testing log of my network design and made a feedback form so that I can know If it
had meet all the needs of the clients/users So that I can evaluate the feedback and make change to the
network design according to the need of clients. The feedback formed is mentioned below:

Independent feedback
Project title: to implement the proposed design
Feedback given by: Signature:
Date: 2018/03/22
Project description: This project is about to implement the proposed design of the network. This

Subash Poudel (HND / first Semester)


20
Professional Practices 2018

design consists of DHCP server, DC, WDS, Print server, web server. This system keeps data secure
and provides quality services to clients. It has high bandwidth and it can be scalable as client’s
requirements.
Important features of the Keep data secure in the system
project Have high data transfer rate
Create scope for DHCP
checklist Yes No Comment
Have find data and files required for design the
system?
Have system fulfill the demand of clients?
Have you get feedback about system?
Have front end and back end of the system has been
planned?
Does it secure data?
Is communication of data possible or not?

Significance of the project It improves communication and available information easily.


It makes files sharing easier.
Project limitation Due to scope limited number of PC connect in the network
It allows for presence of viruses and malware.
It lacks independence.

Feedback evaluation
Feedback evaluated by: Signature:
Date:2018/03/22
Evaluation of the system
I get the positive feedback from clients. Most of clients support my network design for the Nepal
Bank Limited.
Give comment if you need any changes:

Conclusion:

In this task I found that the design I have made for Nepal Bank Limited is useful to the clients. They
have a given a true feedback on my design.

Task13/p8

Document and analyze test results against expected result.

I have tested different servers and devices in my project. In this I will provide evidence that I have
successfully checked each and every servers and devices to meet requirements of my network
design.

Subash Poudel (HND / first Semester)


21
Professional Practices 2018

What is tested: DHCP IP Distribution Configuration Date: 03/22/2018


S/N Expected output Actual output
1 In this task, DHCP member Client obtained dynamic IP
should get IP address from DHCP
dynamically using
DHCPMGMT.MSC

Analysis:
It showed actual results and the results delivered expected output. Client has been able to get an
IP address. This shows DHCP configuration is successful in the system.

What is tested: DC server installation Date: 03/22/2018


S/N Expected output Actual output
2 It is like workgroup base network and I Workgroup base network has been changed
should be changed into domain base into domain base network.
network.

Analysis:
DC showed actual and positive results and the results delivered expected output. It has been changed
into domain base network.

Subash Poudel (HND / first Semester)


22
Professional Practices 2018

What is tested: CDC server installation Date: 03/22/2018


S/N Expected output Actual output
3 CDC name should show with DC name. CDC name successfully showed with domain
name.

Analysis:
Child domain controller shows expected output and positive result. Name of the CDC appeared by
joining with the name of Domain Controller. This shows CDC testing was successfully tested.

What is tested: WDS operating system Date: 03/22/2018


distribution
S/N Expected output Actual output
4 WDS be able to distribute OS to the client WDS distributed OS to the client with help of
with help of DHCP DHCP

Analysis: windows deployment server shows positive results. This result delivered expected output.
Client computer was able to obtain desirable WDS which shows that WDS testing is successfully
testing.

Subash Poudel (HND / first Semester)


23
Professional Practices 2018

What is tested: VPN configuration Date: 03/22/2018


S/N Expected output Actual output
5 Client should be able to ping DC server or Client showed actual output when connected
DC when VPN is connected. with DC.

Analysis: This testing shows positive result. Results delivered expected output. It shown name and
password of client with Domain Controller (DC). This shows that VPN testing has been successful.

What is tested: Printer distribution configuration Date: 03/22/2018


using print server
S/N Expected output Actual output
6 Client should be able to print document After installed, printer showed on the screen
using the printer available o network. of computer.

Analysis: The deploy printer is ready status in client computer which shows positive result. This
shows the expected output and successfully tested.

What is tested: Primary and Secondary DNS Date: 03/22/2018


configuration
S/N Expected output Actual output
7 Domain name and IP address should show Domain name and IP address showed on
on NSLOOKUP command on CMD. NSLLOKUP command on CMD.

Subash Poudel (HND / first Semester)


24
Professional Practices 2018

Analysis: Secondary DNS testing showed positive result. Result delivered expected output.
Transferred data of primary zone appeared in secondary zone, which shows that DNS testing is
successful.

Conclusion:

In this way, I have taken screenshots of final result on each and every testing. Moreover, I have kept
all the screenshots of testing in above tables.

Subash Poudel (HND / first Semester)


25
Professional Practices 2018

Subash Poudel (HND / first Semester)


26
Professional Practices 2018

Subash Poudel (HND / first Semester)


27

S-ar putea să vă placă și