Introduction to Computer Networking

Added on - 12 Aug 2021

  • 70

    Pages

  • 20552

    Words

  • 9

    Views

  • 0

    Downloads

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 8 of 70 pages







ASSIGNMENT COVER SHEET


STUDENT DETAILS

Student IDReg No.
Family NameDEVKOTAGiven NameANISH
Enrolment Year2020SectionL
SemesterFIRSTEmailanishdevkota@ismt.edu.n
p


UNIT DETAILS
Unit TitleUnit Code
Assessor NameIssued Date
Assignment Title
Assignment No1/1Submission Date
QualificationCampusISMT



INTERNATIONAL SCHOOL OF
MANAGEMENT & TECHNOLOGY






STUDENT ASSESSMENT SUBMISSION AND
DECLARATION
When submitting evidence for assessment, each student must sign a declaration
confirming that the work is their own.
Student NameAnish devkotaAssessor NameKrishna Parajuli
Issue DateSubmission Date
ProgrammeBTECH HND leading to bsc.IT
Unit Name
Assignment TitleLotus Inc. Cosmetics
Plagiarism
Plagiarism is a particular form of cheating. Plagiarism must be avoided at all costs and
students who break the rules, however innocently, may be penalized. It is your
responsibility to ensure that you understand correct referencing practices. As a
university level student, you are expected to use appropriate references throughout and
keep carefully detailed notes of all your sources of materials for material you have used
in your work, including any material downloaded from the Internet. Please consult the
relevant unit lecturer or your course tutor if you need any further advice.
Student Declaration













I certify that the assignment submission is entirely my own work and I fully understand
the consequences of plagiarism. I understand that making a false declaration is a form
of malpractice.

Student signature: Anish Devkota Date:
Pearson Education 2018
Higher Education Qualifications






Contents
Introduction to computer networking..................................................................................................... 7
Types of network system........................................................................................................................ 7
Peer-based network............................................................................................................................. 7
Benefits of peer-based network........................................................................................................... 7
Constraints of peer-based network...................................................................................................... 7
Client-server network.......................................................................................................................... 7
Benefits of client-server network........................................................................................................ 8
Constraints of client- server network.................................................................................................. 8
Cloud network..................................................................................................................................... 8
Benefits of cloud network................................................................................................................... 8
Constraints of cloud network.............................................................................................................. 8
Cluster network................................................................................................................................... 8
Benefits of cluster network................................................................................................................. 8
Constraints of cluster network............................................................................................................ 8
Centralized network............................................................................................................................ 9
Benefits of centralized network.......................................................................................................... 9
Constraints of centralized network..................................................................................................... 9
Virtualised network............................................................................................................................. 9
Benefits of virtualised network........................................................................................................... 9
Constraints of virtualised network...................................................................................................... 9
Networking model.................................................................................................................................. 9
OSI model......................................................................................................................................... 10
Feature of OSI model........................................................................................................................ 10
Layer 1: Physical layer.................................................................................................................. 10
Layer 2: Datalink Layer................................................................................................................ 10
Layer 3: Network layer................................................................................................................. 10
Layer 4: Transport Layer.............................................................................................................. 11
Layer 5: Session layer................................................................................................................... 11
Layer 6: Presentation Layer.......................................................................................................... 11
Layer 7: Application Layer........................................................................................................... 11
Benefits of OSI model...................................................................................................................... 11
Constraints of OSI model.................................................................................................................. 11
TCP/IP model.................................................................................................................................... 11
Features of TCP/IP model................................................................................................................. 12
Layer 1: Network access layer...................................................................................................... 12




Layer 2: Internet Layer................................................................................................................. 12
Layer 3: Transport Layer.............................................................................................................. 12
Layer 4: Application Layer........................................................................................................... 12
Benefits of TCP/IP model................................................................................................................. 12
Constraints of TCP/IP model............................................................................................................ 12
Comparison of common networking models/principles (i.e. OSI and TCP/IP).................................... 12
How protocols enable the effectiveness of network system................................................................. 13
Network Standard................................................................................................................................. 13
IEEE 802.x........................................................................................................................................ 13
Conclusion............................................................................................................................................ 14
Networking Topology........................................................................................................................... 14
Logical network topology:................................................................................................................ 14
Physical network topology................................................................................................................ 15
Bus topology..................................................................................................................................... 15
Impact of Bus topology................................................................................................................. 15
Communication and bandwidth requirement:............................................................................... 15
Star topology..................................................................................................................................... 15
Impact of Star topology:............................................................................................................... 16
Communication and bandwidth requirement:............................................................................... 16
Ring topology.................................................................................................................................... 16
Impact of Ring topology:.............................................................................................................. 17
Communication and bandwidth requirement:............................................................................... 17
Mesh topology.................................................................................................................................. 17
Impact of Mesh topology.............................................................................................................. 18
Communication and bandwidth requirement:............................................................................... 18
Tree topology.................................................................................................................................... 18
Impact of tree topology................................................................................................................. 18
Communication and bandwidth requirement................................................................................ 18
Hybrid topology................................................................................................................................ 19
Impact of Hybrid topology............................................................................................................ 19
Communication and bandwidth requirement................................................................................ 19
Networking Devices.............................................................................................................................. 19
Hub.................................................................................................................................................... 19
Switch............................................................................................................................................... 20
Router................................................................................................................................................ 20
Multilayer switches........................................................................................................................... 20




Firewall............................................................................................................................................. 20
HIDS................................................................................................................................................. 20
Repeaters........................................................................................................................................... 20
Bridges.............................................................................................................................................. 20
Wireless devices................................................................................................................................ 21
Access point...................................................................................................................................... 21
Content filter..................................................................................................................................... 21
Load balancer.................................................................................................................................... 21
Modem.............................................................................................................................................. 21
Packet shaper.................................................................................................................................... 21
VPN concentrator.............................................................................................................................. 21
Types of server...................................................................................................................................... 21
Web server........................................................................................................................................ 21
File server.......................................................................................................................................... 22
Database server................................................................................................................................. 22
Combination...................................................................................................................................... 22
Virtualisation..................................................................................................................................... 22
Terminal services server................................................................................................................... 22
Conclusion............................................................................................................................................ 22
Interdependence of workstation hardware and relevant networking software...................................... 22
Selection of the best server................................................................................................................... 23
Therefore, we have decided to select the IBM server. Then we compare the server models and make
up our decision of which server to use. After some research and comparison, server was selected
according to the budget, performance and reviews. Here, we described and compared three different
servers with their specifications or features. Below are some servers that we researched and find more
compatible and suitable for our organization (Global IT solutions)..................................................... 23
Selection of the best network topology................................................................................................. 24
Conclusion............................................................................................................................................ 25
Design of network................................................................................................................................. 25
Server technology used in our network................................................................................................. 25
Domain controller (DC).................................................................................................................... 26
Domain name service (DNS)............................................................................................................ 26
Dynamic host configuration protocol (DHCP)................................................................................. 26
Read-only domain controller (RODC).............................................................................................. 26
Child domain controller (CDC)........................................................................................................ 26
Print server (PS)................................................................................................................................ 26
DHCP relay agent............................................................................................................................. 26




Windows Deployment Service (WDS)............................................................................................. 26
Network components in our design...................................................................................................... 27
Firewall............................................................................................................................................. 27
Switch............................................................................................................................................... 27
Router................................................................................................................................................ 27
Access Point...................................................................................................................................... 27
Testing of design................................................................................................................................... 27
Server testing.................................................................................................................................... 28
Evaluation:........................................................................................................................................ 28
Feedback analysis............................................................................................................................. 29
Feedback form:............................................................................................................................. 29
Analysis............................................................................................................................................ 30
Conclusion............................................................................................................................................ 30
Implementation of network system....................................................................................................... 30
Lab Report on server configuration...................................................................................................... 30
Active Directory Domain Service/ Domain Controller (ADDS/DC) report..................................... 30
Domain Name System (DNS) report................................................................................................ 34
Internet Information Services (IIS) report........................................................................................ 38
Dynamic host configuration protocol (DHCP) report....................................................................... 41
DHCP relay agent report................................................................................................................... 45
Virtual private network (VPN) report............................................................................................... 49
Print server report............................................................................................................................. 51
Windows deployment server (WDS)................................................................................................ 55
Child Domain Controller (CDC)....................................................................................................... 59
Read Only domain controller(RODC).............................................................................................. 61
Test result against expected result........................................................................................................ 63
Conclusion............................................................................................................................................ 66
Maintenance schedule........................................................................................................................... 66
Recommended potential enhancement for network system.................................................................. 67
Critical evaluation of project................................................................................................................. 68
Network design................................................................................................................................. 68
Test plan of the design...................................................................................................................... 68
Implementation of design................................................................................................................. 69
Positive aspect of designed network................................................................................................. 69
Negative aspect of designed network................................................................................................ 69
Recommendation for future improvements...................................................................................... 69




Conclusion............................................................................................................................................ 70


Introduction to computer networking.
Interconnecting two or more than two computers in a single network connected wirelessly or
with the help of wire is determined as computer networking. The main purpose of computer
networking is communication, sharing files and resources. Simply computer networking is
known to be the collection of devices or computers connected together with different
communication devices and transmission media. Firstly, advantage of computer networking
is sharing of file and data would be easier. When computers are interconnected with each
other there can be sharing of hardware devices like printers or scanners due to which work
can be done continently and in a cheaper way. Each and every computer can access data and
file from server by following server protocols or rules. (BegineersBook, n.d.)
Mentioning about the disadvantage, main server failure leads to failure in approaching the
data or files. Hacking, viruses or malware attacks could occur and data might not be safe.
Skilled man power is required for operating the network. Networking of computers is costly
for large scale companies (i.e., buying of networking devices, hiring an it expert, network
cables etc.).
Therefore, being aware of the out coming negative consequences we can implement the
convenient use of computer networking in proper ways and make our life easier and faster.
Types of network system
Peer-based network
It is a network system specially designed or suitable for small to medium local area network.
This system allows user to share resource and files from one node or computer to other one.
In this type of system, every computer is connected with each other without central server.
Each and every connected computer are equally powerful in this network.
Benefits of peer-based network
In this network, due to small scale there will be ease in setup (i.e. configuring and connecting
computers or nodes). There will be less requirement of hardware and no server needs to be
established. This type of system would be cheaper. each and every user can control own
resources. In this network data files can be shared directly from sender to destination.
Constraints of peer-based network
This type of network doesn't compulsorily use server so there won't be centralized network
and central location for storage. There would be lack of security in this network. This type of
server is not favourable for large scale organization. This network is not suitable for large
scale organization which shows the lack of centralized network.
Client-server network
In this network system, all the computers are connected to the central device called server.
Client server system is a system that allows users to access the resources through a server.
Data or the files are stored centrally to the server and transferred to the destination. This
system is very helpful and suitable for large scale organization which requires a centralized




network, security etc. Here, server is the main component which controls, manage and
provides services to the entire network.
Benefits of client-server network
Client server uses server due to which there would be more security, data would be stored
and backed up centrally and there will be less chance of data or information loss. This type of
system is properly managed by the server. Different machines can remotely access server
from different locations.
Constraints of client- server network
Talking about costing, this system is costlier. This server requires a regular maintenance.
Highly skilled man power is required for maintaining this server. A server failure will affect
the entire network system.
Cloud network
Cloud network system means storing or retrieving resources or data in an internet without
using a storage system of computer. Therefore, cloud is known as a network or internet.
google drive, drop box, one drive, etc. are some of the examples of cloud system. We can
access the saved data whenever we can and use the free space provided to us. Cloud network
can be hosted on private, public and hybrid cloud.
Benefits of cloud network
This type of network reduces the expenses of any organization in various ways likely by
reducing the additional requirements of hardware and software. Data can be accessed easily
from the cloud whenever we want. This system helps in increasing the storage capacity of a
node.
Constraints of cloud network
As, we are given the space to save our data but failure of internet would let us in unable to
access the data stored in cloud. Overload in server may occur because of various clients
which may lead us to non-ignored cases in business or many works. Mainly, there is a risk of
hackers or data thief due to which our data can be stooled or approached by unwanted
persons.
Cluster network
Cluster networking refers to the grouping of different computers and servers in a single
network and making it work as a single machine. All the computers in cluster are made to do
same task. These tasks are managed and controlled by software and connected through
dedicated network.
Benefits of cluster network
Certain task can be done in a very fast way because of all computers working as a single. It
would be very helpful for data recovery because same task is done in others nodes too. One
node or computers fails then it won't fail the work. In cluster networking we can add many
computers easily (i.e., ease expandability).
Constraints of cluster network
For clustering more servers and hardware are required in establishing this network due to
which handling or maintaining of this would be difficult. Comparing to non-clustered server
design good hardware and design are required which can be costly.
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document