Large Networking Connect: Cabling, Hardware Setup, DNS, DHCP Design
VerifiedAdded on 2023/06/11
|55
|4359
|461
AI Summary
This project aims to create a large network for PTL Beverages with two sites and over 100 staff members. Learn about the cabling and hardware setup, DNS and DHCP design for large networking with PTL Beverages. Get insights on how to configure DNS and implement DHCP failover in Windows Server 2012.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
LARGE NETWORKING
CONNECT
CONNECT
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 Table of Contents
1 Introduction 3
2 Cabling and Hardware Setup 3
2.1 PC setup 3
2.2 Server setup 7
2.3 Switch Setup 9
2.4 Router Setup 11
2.5 Cabling 13
3 DNS setup 14
4 DHCP design 18
5 Active Directory Design 20
6 Home Drive Setup 21
7 Joining Networks 22
8 Resource Sharing 23
9 Network Security 24
10 Conclusion 24
References 25
2
1 Introduction 3
2 Cabling and Hardware Setup 3
2.1 PC setup 3
2.2 Server setup 7
2.3 Switch Setup 9
2.4 Router Setup 11
2.5 Cabling 13
3 DNS setup 14
4 DHCP design 18
5 Active Directory Design 20
6 Home Drive Setup 21
7 Joining Networks 22
8 Resource Sharing 23
9 Network Security 24
10 Conclusion 24
References 25
2
2 Introduction
This project aims to create the large network for PTL Beverages. The PTL beverage is a
New Zealand company for manufacturing the beverages and food products. This company has
the two sites like Tauranga and Rotorua. More than 100 staff members are currently working on
both sites. This company is divided into two groups like operations and corporate. The PTL
beverages management was anticipating the large growth in production over the next five years.
So, it would like to computerize the most of their function to ease the handling of the business
routines. So, it needs to design and implement the company infrastructure to provide the
effective performance. The current IT infrastructure of PTL beverages has 8 professionals and 80
windows standalone computers and 15 printers at both sites and those sites are having the
internet connectivity. But, it does not provide the effective internet connection. So, the PTL
beverages company is wishes to network all their computers, printers and creating the intranet.
The creation of intranet needs to purchase the software and hardware and it is needs to envision.
But, the company has the sufficient budget for this purpose. So, these issues are address and
create the new network infrastructure for a company. These are will be analyzed and discussed in
detail. The hardware and Cabling setup for proposed network Infrastructure will be discussed.
The DHCP, active directory and DNS setup and design also will be analyzed and discussed in
detail. Network security and resource sharing for proposed network infrastructure also will be
discussed and analyzed in detail.
3 Cabling and Hardware Setup
3.1 PC setup
To setup the PC by following the below steps (Hartpence, 2011),
1. Click the PC
2. Choose the Desktop to select the IP configuration.
In PC 0,
Enter the,
IP address - 192.168.1.10
3
This project aims to create the large network for PTL Beverages. The PTL beverage is a
New Zealand company for manufacturing the beverages and food products. This company has
the two sites like Tauranga and Rotorua. More than 100 staff members are currently working on
both sites. This company is divided into two groups like operations and corporate. The PTL
beverages management was anticipating the large growth in production over the next five years.
So, it would like to computerize the most of their function to ease the handling of the business
routines. So, it needs to design and implement the company infrastructure to provide the
effective performance. The current IT infrastructure of PTL beverages has 8 professionals and 80
windows standalone computers and 15 printers at both sites and those sites are having the
internet connectivity. But, it does not provide the effective internet connection. So, the PTL
beverages company is wishes to network all their computers, printers and creating the intranet.
The creation of intranet needs to purchase the software and hardware and it is needs to envision.
But, the company has the sufficient budget for this purpose. So, these issues are address and
create the new network infrastructure for a company. These are will be analyzed and discussed in
detail. The hardware and Cabling setup for proposed network Infrastructure will be discussed.
The DHCP, active directory and DNS setup and design also will be analyzed and discussed in
detail. Network security and resource sharing for proposed network infrastructure also will be
discussed and analyzed in detail.
3 Cabling and Hardware Setup
3.1 PC setup
To setup the PC by following the below steps (Hartpence, 2011),
1. Click the PC
2. Choose the Desktop to select the IP configuration.
In PC 0,
Enter the,
IP address - 192.168.1.10
3
Subnet mask - 255.255.255.0
Default gateway - 192.168.1.1.
It is displayed in below.
In PC 1,
Enter the
IP address - 192.168.1.11,
Subnet mask - 255.255.255.0
Default gateway - 192.168.1.1.
It is displayed in below.
4
Default gateway - 192.168.1.1.
It is displayed in below.
In PC 1,
Enter the
IP address - 192.168.1.11,
Subnet mask - 255.255.255.0
Default gateway - 192.168.1.1.
It is displayed in below.
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
In PC 3,
Enter the,
IP address - 192.168.2.10
Subnet mask - 255.255.255.0
Default gateway - 192.168.2.1.
It is displayed in below.
5
Enter the,
IP address - 192.168.2.10
Subnet mask - 255.255.255.0
Default gateway - 192.168.2.1.
It is displayed in below.
5
In PC 4,
Enter the,
IP address - 192.168.2.11,
Subnet mask - 255.255.255.0
Default gateway - 192.168.2.1.
It is displayed in below (Valentine & Barker, 2013).
6
Enter the,
IP address - 192.168.2.11,
Subnet mask - 255.255.255.0
Default gateway - 192.168.2.1.
It is displayed in below (Valentine & Barker, 2013).
6
3.2 Server setup
To setup the server by follow
1. Click the server
2. Select the desktop to choose the IP configuration.
In Server 0,
Enter the
IP address - 192.168.1.12
Subnet mask - 255.255.255.0
Default gateway - 192.168.1.1
It is shown in below (Jacob, 2014).
7
To setup the server by follow
1. Click the server
2. Select the desktop to choose the IP configuration.
In Server 0,
Enter the
IP address - 192.168.1.12
Subnet mask - 255.255.255.0
Default gateway - 192.168.1.1
It is shown in below (Jacob, 2014).
7
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
In Server 1,
Enter the,
IP address - 192.168.2.12
Subnet mask - 255.255.255.0
Default gateway - 192.168.2.1
It is shown in below.
8
Enter the,
IP address - 192.168.2.12
Subnet mask - 255.255.255.0
Default gateway - 192.168.2.1
It is shown in below.
8
3.3 Switch Setup
To setup the switch, click the switch.
Then, Enter the below command in the command line interface. It is shown in below.
9
To setup the switch, click the switch.
Then, Enter the below command in the command line interface. It is shown in below.
9
10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
3.4 Router Setup
To setup the route, click the router.
Enter the interface information and set the IP address for the router.
For Router 0,
Enter the Interface as fa0/1
IP address as 192.168.1.1
Subnet mask as 255.255.255.0
Another Interface as se2/0
IP address as 30.0.0.1
Clock rate 64000
Subnet mask as 255.255.255.0
11
To setup the route, click the router.
Enter the interface information and set the IP address for the router.
For Router 0,
Enter the Interface as fa0/1
IP address as 192.168.1.1
Subnet mask as 255.255.255.0
Another Interface as se2/0
IP address as 30.0.0.1
Clock rate 64000
Subnet mask as 255.255.255.0
11
It is shown in below.
For Router 1,
Enter the Interface as fa1/0
IP address as 192.168.2.1
Subnet mask as 255.255.255.0
Interface as se2/0
IP address as 30.0.0.2
Subnet mask as 255.255.255.0
Interface as se3/0
IP address as 50.0.0.1
Subnet mask as 255.255.255.0
It is shown in below.
12
For Router 1,
Enter the Interface as fa1/0
IP address as 192.168.2.1
Subnet mask as 255.255.255.0
Interface as se2/0
IP address as 30.0.0.2
Subnet mask as 255.255.255.0
Interface as se3/0
IP address as 50.0.0.1
Subnet mask as 255.255.255.0
It is shown in below.
12
3.5 Cabling
Here, we are using the RJ45 Connector and Ethernet Cable. It is shown below (Routing and
switching essentials lab manual, 2014).
● The Ethernet cables are used to connect the devices like routers, switches and PCs.
13
Here, we are using the RJ45 Connector and Ethernet Cable. It is shown below (Routing and
switching essentials lab manual, 2014).
● The Ethernet cables are used to connect the devices like routers, switches and PCs.
13
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
● The RJ45 connector is a standard that used with CAT6 and CAT 5 cables. This
cable is used to transmitting the information along their length and it provides the
reliability and scalability of the network.
● It is standardized telecommunication network interface for connecting data and
voice equipment.
4 DNS setup
DNS stands for Domain Name System
This is one of the important internet feature which is widely used for the purpose of
converting alphabetic names into numeric IP addresses. DNS servers are the equivalent of a
phone book. They maintain a one unique directory of domain names and translate those domain
names into internet protocol addresses. This translation process is necessary because, even
though domain name is easily understand as well as easy to remember, computer systems, access
website based on the IP addresses.
DNS server work
DNS help to map domain name for an IP address. For example when we type a domain name
www.example.com then client have to find the IP address of this website to know where it is
located. All this process done using DNS servers. Due to fast growth of internet there are
millions and billions of hostnames and IP addresses which are efficiently managed by DNS
servers.
Steps of DNS server working :
● Using client operating system Windows or Apple ios type website name like google.com
in your browser.
● Second step is the operating system needs to find IP address which will tell where the
google.com is located on earth.
● For this operating system received query from browser.
● Eash operating system is associated with Internet service providers or certain DNS
servers that are also called resolving name servers.
14
cable is used to transmitting the information along their length and it provides the
reliability and scalability of the network.
● It is standardized telecommunication network interface for connecting data and
voice equipment.
4 DNS setup
DNS stands for Domain Name System
This is one of the important internet feature which is widely used for the purpose of
converting alphabetic names into numeric IP addresses. DNS servers are the equivalent of a
phone book. They maintain a one unique directory of domain names and translate those domain
names into internet protocol addresses. This translation process is necessary because, even
though domain name is easily understand as well as easy to remember, computer systems, access
website based on the IP addresses.
DNS server work
DNS help to map domain name for an IP address. For example when we type a domain name
www.example.com then client have to find the IP address of this website to know where it is
located. All this process done using DNS servers. Due to fast growth of internet there are
millions and billions of hostnames and IP addresses which are efficiently managed by DNS
servers.
Steps of DNS server working :
● Using client operating system Windows or Apple ios type website name like google.com
in your browser.
● Second step is the operating system needs to find IP address which will tell where the
google.com is located on earth.
● For this operating system received query from browser.
● Eash operating system is associated with Internet service providers or certain DNS
servers that are also called resolving name servers.
14
● From resolving name servers we can identify where the root server located but complete
information where google.com is not known by resolving name servers.
● After that resolving name server will find the top level domain name server so as to find
the location of google.com.
● Then this authoritative name server will give exact IP address of google.com. This IP
address was send back to resolving name server where it caches the information and
return the answer for an query asked by the browser i.e. where the google.com is located.
● As a result of whole these steps you can see google.com on your homepage Configure
DNS server using windows:
● First step, Open DNS manager.
● According to necessity applicable server can be included in snap- in and then link them.
● On the action menu bar you have to click on configure DNS server.
● In DNS server wizard all the instructions are kept.
In windows 2012 the DNS server can be installed using server manager . Server manager can be
opened by right clicking the manage button in the top right corner and then selecting add roles
and features option (Nelson, 2017).
15
information where google.com is not known by resolving name servers.
● After that resolving name server will find the top level domain name server so as to find
the location of google.com.
● Then this authoritative name server will give exact IP address of google.com. This IP
address was send back to resolving name server where it caches the information and
return the answer for an query asked by the browser i.e. where the google.com is located.
● As a result of whole these steps you can see google.com on your homepage Configure
DNS server using windows:
● First step, Open DNS manager.
● According to necessity applicable server can be included in snap- in and then link them.
● On the action menu bar you have to click on configure DNS server.
● In DNS server wizard all the instructions are kept.
In windows 2012 the DNS server can be installed using server manager . Server manager can be
opened by right clicking the manage button in the top right corner and then selecting add roles
and features option (Nelson, 2017).
15
16
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
This above figure shows the default add roles and features window.In this window you have to
select installation type as - feature based or Role based installation.
.
In the server selection you have to select a server from the server pool and press next.
17
select installation type as - feature based or Role based installation.
.
In the server selection you have to select a server from the server pool and press next.
17
Next in selection of server role select DNS server and press next.
In features window select ADD features.
18
In features window select ADD features.
18
Then using Add features option add .NET framework features in features window and click
next.
Press next button in DNS server default window.
19
next.
Press next button in DNS server default window.
19
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
After that installation will start and features installation will completed as shown below in two
figures.
20
figures.
20
Configuration of DNS
For DNS configuration select DNS tab from tool.
21
For DNS configuration select DNS tab from tool.
21
In manager window select configure a DNS server.
In the configuration wizard, select the action as create a forward lookup zone and click next.
22
In the configuration wizard, select the action as create a forward lookup zone and click next.
22
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Then select the current server as the primary server that maintains the zone.
For the DNS server enter the Zone name.
23
For the DNS server enter the Zone name.
23
Create a new Zone file
In the below window select do not allow dynamic updates.
24
In the below window select do not allow dynamic updates.
24
Select ‘No’ in the below window. It server is not configured it should not forward queries.
DNS configuration is completed.
25
DNS configuration is completed.
25
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
5 DHCP design
In DHCP failover the two DHCP servers uses the same pool of IP addresses that are assign
to an object or node in a network so that they can communicate. They also provide backup in
case of network down. DHCP failover is implemented using Internet Engineering Task Force
(IETF). It is nothing but a draft that defines DHCP failover protocol. In this case two DHCP
servers tries to exchange the status of leases. The sharing of lease status is very important for
users with mobility as they are using laptops. In this scenario users require address more
frequently. If due to any condition the user is not able to connect with server from where it had
received lease then it can connect with other server and renew the lease. This will prevent in
breaking the connections.
DHCP tries to provide uninterrupted services to clients in case of network failure. As the
two DHCP servers share information of users. In this one server act as primary and other
secondary for subnet address pool. They keep ex-changing “ keep- alive” messages between
them. UNder normal situation primary server responds to client requests and update the
secondary server about new updated lease. In in case secondary server is not receiving Keep -
alive messages then it means primary server has failed and it then begins respond to client
requests.
26
In DHCP failover the two DHCP servers uses the same pool of IP addresses that are assign
to an object or node in a network so that they can communicate. They also provide backup in
case of network down. DHCP failover is implemented using Internet Engineering Task Force
(IETF). It is nothing but a draft that defines DHCP failover protocol. In this case two DHCP
servers tries to exchange the status of leases. The sharing of lease status is very important for
users with mobility as they are using laptops. In this scenario users require address more
frequently. If due to any condition the user is not able to connect with server from where it had
received lease then it can connect with other server and renew the lease. This will prevent in
breaking the connections.
DHCP tries to provide uninterrupted services to clients in case of network failure. As the
two DHCP servers share information of users. In this one server act as primary and other
secondary for subnet address pool. They keep ex-changing “ keep- alive” messages between
them. UNder normal situation primary server responds to client requests and update the
secondary server about new updated lease. In in case secondary server is not receiving Keep -
alive messages then it means primary server has failed and it then begins respond to client
requests.
26
In DHCP failover method there are different type of configuration options are available.
Therefore, in all scopes DHCP server can be configured easily. the main advantage of DHCP
failover method is that when we want to upgrade system then we can easily shut down one
system and upgrade it. As other server can pick up load and client can communicate without
break. Two DHCP servers are required to make a relationship. But a server can have many
relationships for failover.
Specifications of DHCP failover
● In windows server 2012 the DHCP failover supports IPV4 scope only.
● In IPv6 they use stateless IP autoconfiguration therefore DHCP server does not maintain
separate lease for IPv6 addresses.
● In case DHCP server are more than two then DHCP failure cannot be implemented.
● The setting of DHCP failover can be changed without using stop, pause or restart buttons
for its services.
27
Therefore, in all scopes DHCP server can be configured easily. the main advantage of DHCP
failover method is that when we want to upgrade system then we can easily shut down one
system and upgrade it. As other server can pick up load and client can communicate without
break. Two DHCP servers are required to make a relationship. But a server can have many
relationships for failover.
Specifications of DHCP failover
● In windows server 2012 the DHCP failover supports IPV4 scope only.
● In IPv6 they use stateless IP autoconfiguration therefore DHCP server does not maintain
separate lease for IPv6 addresses.
● In case DHCP server are more than two then DHCP failure cannot be implemented.
● The setting of DHCP failover can be changed without using stop, pause or restart buttons
for its services.
27
● Using DHCP relay the DHCP client should communicate with DHCP servers.
● In DHCP failover system two different client leases database are maintained.
● Continuity is checked between DHCP client and their lease.
● Two DHCP servers configured for failover pattern should know the services offered by
other server and if any change is done without delay.
● The DHCP servers configured for failover pattern cannot communicate with each other.
● Several measures are taken to prevent any client issues.
● If DHCP servers are failover enabled then there settings are replicated manually for
DHCP server partners.
● DHCP server partners can run on windows 2012 or its higher version.
Implementation of DHCP failover in Windows server 2012
In LAN networks the implementation of DHCP failover improve reliability of network.
There are two modes for configuring DHCP failover system :
● Load balance
● Hot standby
Load balance is an Active- Active configuration. In this both DHCP server help in serving the
clients requests with distribution of load.
While Hot standby uses Active- Passive configuration. In this one of the two DHCP server one
act as active and other standby. For redundancy purposes Hot standby mode of DHCP servers are
used. Below the Hot standby mode is used.
In windows 2012 open server manager.
28
● In DHCP failover system two different client leases database are maintained.
● Continuity is checked between DHCP client and their lease.
● Two DHCP servers configured for failover pattern should know the services offered by
other server and if any change is done without delay.
● The DHCP servers configured for failover pattern cannot communicate with each other.
● Several measures are taken to prevent any client issues.
● If DHCP servers are failover enabled then there settings are replicated manually for
DHCP server partners.
● DHCP server partners can run on windows 2012 or its higher version.
Implementation of DHCP failover in Windows server 2012
In LAN networks the implementation of DHCP failover improve reliability of network.
There are two modes for configuring DHCP failover system :
● Load balance
● Hot standby
Load balance is an Active- Active configuration. In this both DHCP server help in serving the
clients requests with distribution of load.
While Hot standby uses Active- Passive configuration. In this one of the two DHCP server one
act as active and other standby. For redundancy purposes Hot standby mode of DHCP servers are
used. Below the Hot standby mode is used.
In windows 2012 open server manager.
28
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Installation process is started by clicking Next button
In the installation type tab there are two options select role based or feature based installation.
29
In the installation type tab there are two options select role based or feature based installation.
29
In the server selection tab choose option saying - select a server from the server pool.
In the server role tab select the option - DHCP server.
30
In the server role tab select the option - DHCP server.
30
In the Add roles and features wizard window click Add features tab.
In the features selection tab choose option - .Net framework 3.5 features.
31
In the features selection tab choose option - .Net framework 3.5 features.
31
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
In default page of DHCP server click on Next tab.
To start installation click on the install button.
32
To start installation click on the install button.
32
In below window installation process is shown.
Feautre Installation process is completed.
33
Feautre Installation process is completed.
33
Configuration of DHCP
In description window click Next button to start configuration process of DHCP.
34
In description window click Next button to start configuration process of DHCP.
34
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
The username is mentioned as business / administrator in the authorization window and then
click the commit button.
In the left column right click IPv4 and select new scope option in the DHCP window.
35
click the commit button.
In the left column right click IPv4 and select new scope option in the DHCP window.
35
Click the Next button in New Scope Wizard window.
Enter the name as Business in New Scope Wizard window.
36
Enter the name as Business in New Scope Wizard window.
36
In New Scope Wizard window add rage of IP addresses from starting to ending.
In below window we can add exclusions of IP addresses.
Set Default lease duration.
37
In below window we can add exclusions of IP addresses.
Set Default lease duration.
37
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Choose ‘Yes’ option in the below window.
For the gateway add IP address.
38
For the gateway add IP address.
38
Specify Domain name for the DNS server
For the server specify the IP address.
39
For the server specify the IP address.
39
To activate the scope click ‘Yes’ button in the New Scope Wizard Window.
In last click the Finish button.
40
In last click the Finish button.
40
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Click configure failover option in DHCP window to start the failover configuration.
In the below window click select all option.
41
In the below window click select all option.
41
To add partner server click ADD server option.
6 Active Directory Design
The Active Directory is developed by Microsoft that provide directory services for
several windows domain networks . It is organized and maintained by centralized domain
management system. It provides all mechanisms and framework for authorization and
authentication of various services. Active directory helps in viewing different series of network
objects and obtain a hierarchical view of the network from a single point. It stores all information
about network objects and made available to users through logon process.
The running of active domain service is called as Domain Controller. It help in providing
and enforcing security policies to all the users. Every time user login the system check username
and password enter correct or not. It also help in checking that user logged in is a normal user or
an administrator .It help in several deployment services like federal services, lightweight
directory services,certificate services and right management services. But the most popular
service is Active Directory Domain Service (ADDS).
An active directory provide information to end users about services like hardware and
printer services etc. on various networks example Web email. Active directories are used in large
organization by network administrators to simply the network maintenance. Active directories
42
6 Active Directory Design
The Active Directory is developed by Microsoft that provide directory services for
several windows domain networks . It is organized and maintained by centralized domain
management system. It provides all mechanisms and framework for authorization and
authentication of various services. Active directory helps in viewing different series of network
objects and obtain a hierarchical view of the network from a single point. It stores all information
about network objects and made available to users through logon process.
The running of active domain service is called as Domain Controller. It help in providing
and enforcing security policies to all the users. Every time user login the system check username
and password enter correct or not. It also help in checking that user logged in is a normal user or
an administrator .It help in several deployment services like federal services, lightweight
directory services,certificate services and right management services. But the most popular
service is Active Directory Domain Service (ADDS).
An active directory provide information to end users about services like hardware and
printer services etc. on various networks example Web email. Active directories are used in large
organization by network administrators to simply the network maintenance. Active directories
42
can help network administrators to update objects . It also help in allowing access or deny to user
in network. Not only this active directories help in maintaining and organizing big organization
by avoiding performing the individual process for each task. As the network is distributed and
highly complex so network administrator with good knowledge is required.
Advantages of Active Directory
● Increases Scalability
● Help in syncing the username and password between active directory and LDAP
directory services.
● It help in login single user with username and password that are used somewhere else.
● Centralized management of data help in improving speed
● Improves security of workstation
● Overhead can be decreased because of standardization.
● Large organization can effectively store such large amount of information on such huge
network (Dubey, 2017).
Configuration of Active Directory
First step is to install on server manager.
43
in network. Not only this active directories help in maintaining and organizing big organization
by avoiding performing the individual process for each task. As the network is distributed and
highly complex so network administrator with good knowledge is required.
Advantages of Active Directory
● Increases Scalability
● Help in syncing the username and password between active directory and LDAP
directory services.
● It help in login single user with username and password that are used somewhere else.
● Centralized management of data help in improving speed
● Improves security of workstation
● Overhead can be decreased because of standardization.
● Large organization can effectively store such large amount of information on such huge
network (Dubey, 2017).
Configuration of Active Directory
First step is to install on server manager.
43
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
In the Add roles and features wizard, click the next option to begin the installation(Francis,
2017).
Then select the installation type as role based.
In the server selection, click the select a server from server pool option.
44
2017).
Then select the installation type as role based.
In the server selection, click the select a server from server pool option.
44
In the server roles option, select the Active directory domain services option and click next.
Then click the AD DS option from the below window.
45
Then click the AD DS option from the below window.
45
In the confirmation window, click the install button to start the installation process.
The installation process is shown in the below window.
46
The installation process is shown in the below window.
46
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
The installation process is successfully completed.
Active Directory Configuration
To initialize the active directory configuration, click the AD DS option from the Left side
of the window.
The list of server tasks are shown in the below window with its details.
47
Active Directory Configuration
To initialize the active directory configuration, click the AD DS option from the Left side
of the window.
The list of server tasks are shown in the below window with its details.
47
To start the configuration window, click the deployment configuration option and select the
deployment operation as Add a new forest and click next.
Active Directory Configuration
48
deployment operation as Add a new forest and click next.
Active Directory Configuration
48
To initialize the active directory configuration, click the AD DS option from the Left side
of the window.
The list of server tasks are shown in the below window with its details.
49
of the window.
The list of server tasks are shown in the below window with its details.
49
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
To start the configuration window, click the deployment configuration option and select the
deployment operation as Add a new forest and click next.
In the domain controller option, enter the DSRM password.
50
deployment operation as Add a new forest and click next.
In the domain controller option, enter the DSRM password.
50
Enter the NetBIOS name in the below screen.
Before prompting the domain server controller, check the prerequisites. If the pre requisites are
not installed then start the installation process should not be started, until the completion of the
prerequisite. If the installation process is completed, then reboot the server.
After the installation process completes it shows above the console of Active Directory.
7 Home Drive Setup
The home drive setup is done by using the active directory domain services because it used
to assign the permission to access the activity directory users and computer management console,
logon script and computer management console to access a home folder to a user. The home
drive setup is mitigated with the onedrive because the proposed network infrastructure of PTL
51
Before prompting the domain server controller, check the prerequisites. If the pre requisites are
not installed then start the installation process should not be started, until the completion of the
prerequisite. If the installation process is completed, then reboot the server.
After the installation process completes it shows above the console of Active Directory.
7 Home Drive Setup
The home drive setup is done by using the active directory domain services because it used
to assign the permission to access the activity directory users and computer management console,
logon script and computer management console to access a home folder to a user. The home
drive setup is mitigated with the onedrive because the proposed network infrastructure of PTL
51
Beverages Company needs to setup the home drive to onedrive folder. It is helping the end users
collaborate and giving the admin additional capabilities to manage their company data. It also
helps to boost adoption and create the power users for a company. It enables the users to work
from any device, anytime and anywhere and it does not require internet access. It easily gains the
Insight into the company (Chen, 2012). The home drive setup steps are,
✓ Click the start---> programs--->Administrative tools and click he active directory users
and computers,
✓ Then, click users.
✓ Right click the user account and click he properties
✓ After, click profile on properties window.
✓ Under the home folder,
✓ Assign the home folders on the network server to click connect and specify the drive
letter.
✓ In the To box and choose the path.
✓ Finally click the OK.
8 Joining Networks
The proposed network infrastructure is used to joining the both sites network by using the
Cisco routers. The proposed network setup includes the router, switch, server and PC setup and
these are required to configured successfully. In network diagram, the routers are connecting the
switches. The switches are connected with the PC and server. These are interconnecting with
each other. And, network infrastructure used the two services like DHCP and DNS services.
These are communicate each other. The proposed network infrastructure also use the Cisco
products because it reduce the operational and maintenance cost. It also compatible for company
52
collaborate and giving the admin additional capabilities to manage their company data. It also
helps to boost adoption and create the power users for a company. It enables the users to work
from any device, anytime and anywhere and it does not require internet access. It easily gains the
Insight into the company (Chen, 2012). The home drive setup steps are,
✓ Click the start---> programs--->Administrative tools and click he active directory users
and computers,
✓ Then, click users.
✓ Right click the user account and click he properties
✓ After, click profile on properties window.
✓ Under the home folder,
✓ Assign the home folders on the network server to click connect and specify the drive
letter.
✓ In the To box and choose the path.
✓ Finally click the OK.
8 Joining Networks
The proposed network infrastructure is used to joining the both sites network by using the
Cisco routers. The proposed network setup includes the router, switch, server and PC setup and
these are required to configured successfully. In network diagram, the routers are connecting the
switches. The switches are connected with the PC and server. These are interconnecting with
each other. And, network infrastructure used the two services like DHCP and DNS services.
These are communicate each other. The proposed network infrastructure also use the Cisco
products because it reduce the operational and maintenance cost. It also compatible for company
52
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
cost. It allow user to easily and conveniently share the resource among each other and all the
users are has the secure access to the storage space on the network. This network should be
optimized for network redundancy and provide the high security for a company. It is shown in
below (MCSE Windows® 2000 Network Infrastructure Design Exam Notes, 2006).
The Cisco file is attched here.
9 Resource Sharing
The resource sharing is used to describe the organized attempt by information centres and
libraries to share the services and material cooperatively so as to provide the one another
resources that might otherwise not be available to a company. It expands the availability of
specialized, expansive and owned resources beyond the company. In computing system, the
sharing resources can be accessed or remotely accessed the multiple administrative domains and
53
users are has the secure access to the storage space on the network. This network should be
optimized for network redundancy and provide the high security for a company. It is shown in
below (MCSE Windows® 2000 Network Infrastructure Design Exam Notes, 2006).
The Cisco file is attched here.
9 Resource Sharing
The resource sharing is used to describe the organized attempt by information centres and
libraries to share the services and material cooperatively so as to provide the one another
resources that might otherwise not be available to a company. It expands the availability of
specialized, expansive and owned resources beyond the company. In computing system, the
sharing resources can be accessed or remotely accessed the multiple administrative domains and
53
it made available from one host to another host on a network. It is possible by using the inter
process communication over the network. The proposed network infrastructure is allowing user
to share the information and resources for another sites. This network enables the users to share
the resource at any device, anytime and anywhere. The resource sharing for both sites is sued ti
increase the production capacity by adding the new manufacturing counter measures. This
network is needs to utilize the resource sharing for a company. This company needs to shares the
manufacturing demand information and joined activities within a company. The resource sharing
is used to provide the profitability and productivity for a company.
10 Network Security
The network security is any activity designed to protect the integrity and usability of the
company network and data including the both software and hardware technologies. The network
security is used to provide the effective network and it manages access to the network. The
network security is targets a variety of threats and stops them from spreading and entering on the
network. It is used to combines the multiple layers of defenses at the edge and in the network.
The proposed network infrastructure provides the high security and it implements the existing
network controls and policies. It allows only authorized users are gain access to the network
resources and also malicious users are blocked from carrying out the threats and exploits. This
network delivers the secure services that customers and employees demand and it must protect
the network. It helps to protect the proprietary information from the attack. It also protects the
company reputations.
11 Conclusion
This project was successfully created the large network for PTL Beverages. The PTL
beverage is a New Zealand company for manufacturing the beverages and food products. The
PTL beverages management was anticipating the large growth in production over the next five
years. So, it would like to computerize the most of their function to ease the handling of the
business routines. It needs to design and implement the company infrastructure to provide the
54
process communication over the network. The proposed network infrastructure is allowing user
to share the information and resources for another sites. This network enables the users to share
the resource at any device, anytime and anywhere. The resource sharing for both sites is sued ti
increase the production capacity by adding the new manufacturing counter measures. This
network is needs to utilize the resource sharing for a company. This company needs to shares the
manufacturing demand information and joined activities within a company. The resource sharing
is used to provide the profitability and productivity for a company.
10 Network Security
The network security is any activity designed to protect the integrity and usability of the
company network and data including the both software and hardware technologies. The network
security is used to provide the effective network and it manages access to the network. The
network security is targets a variety of threats and stops them from spreading and entering on the
network. It is used to combines the multiple layers of defenses at the edge and in the network.
The proposed network infrastructure provides the high security and it implements the existing
network controls and policies. It allows only authorized users are gain access to the network
resources and also malicious users are blocked from carrying out the threats and exploits. This
network delivers the secure services that customers and employees demand and it must protect
the network. It helps to protect the proprietary information from the attack. It also protects the
company reputations.
11 Conclusion
This project was successfully created the large network for PTL Beverages. The PTL
beverage is a New Zealand company for manufacturing the beverages and food products. The
PTL beverages management was anticipating the large growth in production over the next five
years. So, it would like to computerize the most of their function to ease the handling of the
business routines. It needs to design and implement the company infrastructure to provide the
54
effective performance. So, the PTL beverages company is wishes to network all their computers,
printers and creating the intranet. The creation of intranet needs to purchase the software and
hardware and it is needs to envision. But, the company has the sufficient budget for this purpose.
So, these issues are needs to address and created the new network infrastructure for a company.
These are analyzed and discussed in detail. The hardware and Cabling setup for proposed
network Infrastructure discussed. The DHCP, active directory and DNS setup and design also
analyzed and discussed in detail. Network security and resource sharing for proposed network
infrastructure also discussed and analyzed in detail.
References
AD DS Design and Planning. (2018). Retrieved from https://docs.microsoft.com/en-us/windows-
server/identity/ad-ds/plan/ad-ds-design-and-planning
Beijnum, I. (2012). Running IPv6. [New York]: Apress.
Chen, K. (2012). Architecture Design and Management for Data Center Networks.
Cisco Press. (2014). Routing and switching essentials lab manual. Indianapolis, Indiana.
Creating a Domain Design. (2018). Retrieved from https://docs.microsoft.com/en-us/windows-
server/identity/ad-ds/plan/creating-a-domain-design
Hartpence, B. (2011). Packet guide to routing and switching. Sebastopol, CA: O'Reilly Media.
Jacob, M. (2014). Learning Network Routing. [Carpinteria, Calif.]: Lynda.com.
Rajarajan, M. (2012). Security and privacy in communication networks. Berlin: Springer.
Valentine, M., & Barker, K. (2013). Cisco CCNA. [Place of publication not identified]: Pearson
Education.
Wiley. (2006). MCSE Windows® 2000 Network Infrastructure Design Exam Notes.
55
printers and creating the intranet. The creation of intranet needs to purchase the software and
hardware and it is needs to envision. But, the company has the sufficient budget for this purpose.
So, these issues are needs to address and created the new network infrastructure for a company.
These are analyzed and discussed in detail. The hardware and Cabling setup for proposed
network Infrastructure discussed. The DHCP, active directory and DNS setup and design also
analyzed and discussed in detail. Network security and resource sharing for proposed network
infrastructure also discussed and analyzed in detail.
References
AD DS Design and Planning. (2018). Retrieved from https://docs.microsoft.com/en-us/windows-
server/identity/ad-ds/plan/ad-ds-design-and-planning
Beijnum, I. (2012). Running IPv6. [New York]: Apress.
Chen, K. (2012). Architecture Design and Management for Data Center Networks.
Cisco Press. (2014). Routing and switching essentials lab manual. Indianapolis, Indiana.
Creating a Domain Design. (2018). Retrieved from https://docs.microsoft.com/en-us/windows-
server/identity/ad-ds/plan/creating-a-domain-design
Hartpence, B. (2011). Packet guide to routing and switching. Sebastopol, CA: O'Reilly Media.
Jacob, M. (2014). Learning Network Routing. [Carpinteria, Calif.]: Lynda.com.
Rajarajan, M. (2012). Security and privacy in communication networks. Berlin: Springer.
Valentine, M., & Barker, K. (2013). Cisco CCNA. [Place of publication not identified]: Pearson
Education.
Wiley. (2006). MCSE Windows® 2000 Network Infrastructure Design Exam Notes.
55
1 out of 55
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.