Professional Documents
Culture Documents
Network Technology
Network Technology
TECHNOLOGIES
As we were asked to create an assignment under the subject Networking technologies at Esoft
computer studies PVT Ltd. This assignment has been the assignment to bring up and make up
our knowledge so far what we learnt about this subject.
As I have put my whole effort to do this assignment regarding Networking and how to handle
with projects. We have been taught regarding these in the past 04 months. I have been given my
level best to do this assignment in a successful way.
Since we have asked to do this assignment by a scenario which contains all the questions also
clues it was not that difficult to do this assignment.
Through this assignment I have gain a lot of knowledge‟s. I would like to thank all my
colleagues in my acknowledgement.
Thank you.
I like to thank Esoft computer studies PVT LTD for providing me an opportunity to do our assignment.
I have taken efforts in this assignment. However, it would not have been possible without the kind
support and help of many individuals. I would like to extend my sincere thanks to all of them.
I am highly indebted to Mr. Lahiru for his guidance and constant supervision as well as for providing
necessary information regarding the assignment & also for his support which was given in completing
the assignment.
I would like to express my gratitude towards my friends of Esoft (pvt) LTD for their kind co-operation
and encouragement which helped me in completion of this assignment.
I would like to express my special gratitude and thanks to my parents for letting me do my assignment
late night without any hesitation.
Thank you,
Asif
TASK 01
1.1.Explain the terms client server architecture and peer to peer architecture using diagrams
describe advantages and disadvantages in both approaches. Provide examples from real
world which uses these two methods…………………………………….........................06-10
1.2.Suggest a suitable topology for below scenario (task 2) and explain why you select that
topology and explain advantages and disadvantages of selected topology……………....11-15
1.3.Evaluate the impact of current network technology,
communication and standards……………………………………………………...…….16-19
1.4.Discuss the term protocol in network and how the protocols enable the effective utilization of
different networking systems……………………………………………………………..20-23
TASK 02
2.1. Explain networking software and hardware and the usage and functionality of those
according to the given scenario……………………………………………………………....24-34
2.2. As new network administrator you have to suggest what the required servers are after
analyzing the network in the each floor. It is required to analyze different products available in
market, their cost and benefit and why you suggest them for above network……………….35-38
2.3. Discuss the inter-dependence of work station hardware with network components…….39-40
TASK 03
3.1. Draw suggested topology and network devices for each floor to meet the given specification
for above case study. In this diagram you must show devices Cleary….……………………41-45
3.2. Evaluate the above design and analyze user feedback. (Considering bandwidth, quality,
security and scalability, etc...)………………………………………….…………………….46-47
4.1. Implement a network system based on the design you have prepared under task 3.1. (Note:
installation of communication devices, allocation of address, local client configuration, server
configuration server installation with screen shots)……………………………………….…49-60
4.2. Use appropriate testing methods to test the system (analyze test results against expected
results) and prepare a documentation………………………………………………………...61-65
4.3. After a one year of time management has decided to expand their networked system
recommend useful enhancement for the system…………………………………………………66
CRITICAL APPRAISAL……………………………………………………………………....69
GANTT CHART………………………………………………………………………………..70
REFERENCE…………………………………………………………………………………...71
1.1. Explain the terms client server architecture and peer to peer architecture using
diagrams describe advantages and disadvantages in both approaches. Provide examples
from real world which uses these two methods.
There are two common types of networking Architecture's, they are; Peer to Peer and
Client-Server.
“The type of computing system, in which one powerful workstation serves the requests of
other systems, is an example of client server technology. A computer network is an
interconnection of computers which share various resources.
Client/server describes the relationship between
two computer programs in which one program, the
client, makes a service request from another
program, the server, which fulfils the request. A
client computer provides the user interface and
some or all application processing, while the a
server computer might provide high-
volume storage capacity, heavy data crunching,
Presentation
Request Processing
Response
Client Server Data
Thin client
Presentation
Processing +Data
Client Server
Thick client
Thick client we can call has a heavy client. Thick clients are functional whether they are
connected to a network or not. In thick client without switch we can connect the machine.
When a thick client is disconnected from the network, it is often referred to as a
workstation.
Client Data
Presentation + processing
Server
Server
Data
Client
N-tier architecture
N-tier application structure implies the client/server program model. Where there are more
than three distribution levels or tiers involved, the additional tiers in the application are
usually associated with the business logic tier. It can be web server or email server.
Web server
1. Sever failure:- there is always the chance that a failure of the server will bring network
business to a halt. For example; if a single server hosts the user names and passwords
database for a network, and the server suffers a failure, no users will be able to log on to
the network until the server is fixed or replaced.
2. Higher than anticipated costs
3. The server can become over loaded. (huge traffic)
4. scalable network: thanks to this architecture it is possible to remove or add clients without
affecting the operation of the network and without the need for major modification
5. we should have backup
In peer to peer (p2p) network there is no spate client and server. One machine can act as
client and server. Peer-to-peer networks are generally simpler, but they usually do not offer
the same performance under heavy loads. For example; work station.
Figure 1.2
What is a topology?
Bus Topology
Star Topology
Ring Topology
Mesh Topology
Tree Topology
Hybrid Topology
In the bus topology, all the devices are connected to a main cable called the bus or the backbone.
Hence, in effect each workstation is directly connected to every other workstation in the network.
Bus networks are inexpensive and easy to install for small networks. It requires fewer cables.
This network topology can perform well only for a limited number of nodes.
Disadvantages
Star Topology
A Star topology is designed with each node connected directly to a central network hub. Star
networks are easy to install and manage. Data on a star network passes through the hub, switch
or concentrator before continuing to its destination. Hub, switch or concentrator manages and
controls all the functions of the network.
Advantages
The problems can be easily located logically in a Star Topology and therefore is easy to
troubleshoot also.
Good performance is not as greatly affected by the number of other computers being used
on the network.
Disadvantages
Uses lot of cables, which is high expensive than other topologies.
Extra hardware devices needed, such as Hubs or Switches.
Advantages
Comparing to other topology, the cost installation and the expanding is less.
Works effectively when processing is distributed across a site.
Routing between devices is simple because messages normally travel in one direction.
The ring network topology provides the fastest form of local area Network
Disadvantages
Difficult to add and remove devices once the network has been set up.
Slower than a star topology under normal load.
Mesh Topology
Disadvantages
Selected topology
Esoft computer studies Pvt (Ltd) institute is having four floors. 15 computers in the first floor
including one server, 40 computers in the third and fourth floors including 2 servers, and 20
computers and two servers in second floor. So to implement this LAN network to ease day to day
operations, according to my knowledge I suggest a Star topology to implant this Local Area
Network, Because the Star topology is the latest new topology and I think it will give Esoft more
benefits. Such as Esoft Computer Studies Pvt (Ltd), department structure, supports to implement
this topology.
I selected Star topology cause when the company wants to implement this in to the network its
less costly when compared to other topologies and if the management decides to expand the
system this can be done without interrupting the other device in the network .why I say this is a
good topology to the company is because it has four floors in which those four floors have four
switches for each floor where does four switches link to a main switch so when we consider that
a star topology is well suited for this company as its less costly and easy to expand.
There are many impacts of current network technology; some of them are listed below
VOIP
Wi-Fi
WIMAX
VOIP
The short form of VOIP- Voice Over Internet Protocol, a group of hardware and software that
allows people to use the internet as transmission medium for telephone calls by transfer voice
data in packets using IP rather than traditional circuit transmissions. If you have a reasonable
quality Internet connection you can get phone service delivered through your Internet connection
instead of from your local phone company. Advantage of VOIP is we can toll-free calls, we can
reduce wiring costs, easy relocation, roaming facility etc…
A common misconception is that the term Wi-Fi is short for "wireless fidelity,"Wi-Fi is the
name of a popular wireless networking technology that uses radio waves to provide wireless
high-speed Internet and Network connections. Wi-Fi is simply a trademarked term meaning
IEEE 802.11x. A wireless network uses radio waves, just like cell phones, televisions and radios
etc. Wi-Fi connects you to your favorite content and communications over your mobile phone,
computer, media players and other devices – all without cumbersome cables.
This is what happens in Wi-Fi, A computer‟s wireless adapter translates data into a radio signal
and transmits it using an antenna, then a wireless router receives the signal and decodes it, The
router sends the information to the internet using a physical, wired Ethernet connection
When you're on the move, Wi-Fi lets you connect to the Internet or your office from an airport
or coffee shop and helps you stay productive when you're away from home.
The Impact of the current network technology is Wi-Fi. Wi-Fi is a big impact of
communication. Now a day‟s wireless network is the best communication media, most of the
time and most of the people are using Wi-Fi.
The 802.11 standards was the original which came into in 1997 and registered in 1999 it
transfer rare at the time was 1 to 2 MBPS.
802.11a
The 802.11a same as the original 802.11 standards this is because it uses data link layer
protocols and fame are same as used in the 802.11 standards but the transfer rate for
802.11a is 5GHz bandwidth for operation and 54MBPS data range this is very easy when
performing many task at the same time.
802.11b
The 802.11b also used the same media which was defined by the original 802.11
standards, what it had here is the 802.11b has the straight addition of modulator
technology same as in the 802.11. The 802.11b supports bandwidth up to 11 Mbps. But
the band to operate 802.11b is 2.4 GHz but there are other devices which can operate like
that for example Bluetooth, monitors.
802.11g
The 802.11g was authorized in 2003 as a third modulation device which emerged on the
market. An 802.11g attempt was to combine the best of both 802.11a and 802.11b.the
bandwidth of 802.11g was 54Mbps and it used a 2.4GHz frequency for a greater range.
802.11g is backwards compatible with 802.11b, meaning that 802.11g access points will
work with 802.11b wireless network adapters and vice versa.
802.11n
The newest standard in the 802.11 was the 802.11n it was designed to improve on the
802.11g in the amount of bandwidth supported by utilizing multiple wireless signals and
antenna instead of one. This 802.11n connection can support data rate of 100MBPS and
is also backward compatible with 802.11g.
A network protocol defines rules and conventions for communication between network devices.
Protocols for computer networking all generally use packet switching techniques to send and
receive messages in the form of packets.
Internet Protocol (IP) itself, higher-level protocols like TCP, UDP, HTTP, and FTP all integrate
with IP to provide additional capabilities. Similarly, lower-level Internet Protocols
like ARP and ICMP also co-exist with IP.
FTP
FTP (File Transfer Protocol) is the simplest and the most secure way to exchange files over
Internet.
The most common use for FTP is to download files from the internet. In addition, the ability to
transfer files back-and-forth makes FTP essential for anyone creating a webpage and
professionals alike.
You can use FTP to exchange files between computer accounts, transfer files between an account
and a desktop computer, or access online software archives. Keep in mind, however, that many
FTP sites are heavily used and require several attempts before connecting.
HTTP
Short Form of HTTP is Hyper Text Transfer Protocol, the underlying protocol used by the
World. HTTP defines how messages are structured and transferred, and what actions Web
servers and browsers should take in response to various commands. For example, when you enter
a URL in your browser, this actually sends an HTTP command to the Web server directing it to
fetch and transmit the requested page. HTTP Is a request-response protocol. For example, a Web
browser initiates a request to a server, typically by opening a TCP/IP connection. The request
itself includes a request line, a set of request headers and an entity. The server sends a response
that comprises a status line, a set of response headers and an entity. The entity in the request or
response can be thought of simply as the payload, which may be binary data. The other items are
TCP/IP
Protocol Internet Protocol, the suite of communications protocols used to connect hosts on
the Internet. TCP/IP uses several protocols, the two main ones being TCP and IP. It can also be
used as a communications protocol in a private network. When you are set up with direct access
to the Internet, your computer is provided with a copy of the TCP/IP program just as every other
computer that you may send messages to or get information from also has a copy of TCP/IP.
TCP/IP is built into the UNIX operating system and is used by the Internet, making it the de
facto standard for transmitting data over networks. Even network operating systems that have
their own protocols, such as Netware, also support TCP/IP.
Inside the TCP/IP standard there are several protocols for handling data communication:
Ethernet
Local Talk
Token Ring
FDDI
ATM
Local Talk
Local talk is a network protocol which was originally developed by apple computer for
Macintosh computers. What method they used was local talk using CSMA/CA referred as
Carrier Sense Multiple Access with Collision Avoidance it was very similar to the CSMA/CD
except that a computer signals its intents to transmit before it actually does so. Local talk
adapters and special twisted pair cables can be used to connect a series of computers through the
serial port.
Token Ring
The token ring is a protocol which was developed originally by IBM in the 1980s this token ring
involves token passing. in a token ring the computers are connected so that the signal will travel
around the network from one computer to another computer in a logical ring. This is done by a
single electronic token which moves around the ring from one computer to the other computer.
Internet Protocol addresses consist of four numbers separated by periods (also called a 'dotted-
quad') and looks something like 127.0.0.1. And IP address is 32bit value. This means that there
are four billion different IP address possibility. IP address may be set in software and are thus
flexible. And we are using IP address to identify our computer.
• After that type IPCONFIG and enter, it will display the internet connection type,
IP address, Subnet mask and if we have more than one network card it will show
them.
2.1. Explain networking software and hardware and the usage and functionality of those
according to the given scenario
When we going to implement a network system several hardware and software components are
required to extending the connectivity capability of an Ethernet local area network
Hardware components which are essential to the construction and interconnection of local area
networks that transmit information over wired media, such as coaxial cable, twisted pair, fiber
optic. These components provide ability to extend the distance of local area network coverage.
Repeaters
Bridge
When you have two or more networks with different Layer 2 protocols if you want to connect to
the networks, you can connect networks using a bridge. Bridge is also used to divide the network
into separate segments. This is to filter traffic and to create an effective network. May be
processed and function of the bridge by an application program. In Windows XP, when you
install two network cards or more, are automatically create a network bridge for you. There
network bridge codes appear in the Network Connections folder. However, in Windows XP
Service Pack 2 (SP2), will create a network bridge after user confirmation this behavior is
consistent with SP2 main objective is to improve the security of computer networks.
Transparent bridge
A transparent bridge provides a connection between two local area networks that employ the
same data link protocol. Transparent bridge is most suitable to interconnect small number of
networks.
Translating bridge
We can use translating bridge to connect two local area networks that employ different protocols
at the data link layer. A translating bridge also provides support for different physical layer
connections.
Routers
Router functions to transfer packets on different networks. Router maintains a routing table.
Routing table contains the IP addresses of the routers in other networks. In a static route to the
routing table is configured manually, while the dynamic router can communicate with other
routers and configure the routing table based on information received from other routers.
Network adapters
Network adapter serves as a link between the computer and the device or network. You may
need Ethernet, WI-Fi, HomePNA, or HomePlug network adapter depending on the type of
network that is connected to your computer. Network adapter converts the computer in electrical
or optical signals to transfer over the network. Admittedly network card in the network by MAC
address is hard coded to the hardware by the manufacturer.
Hub
The hub is a central contact point in the network. The center is used in a network that uses a star
topology. A sending computer sends a signal to the hub, retransmission later refer to all other
computers. A negative center functions as a relay station that receives and re-signals. Active
functions reproduce renew before the broadcast signal.
Using a hub, and participates in the network bandwidth (capacity) by all available computers,
each computer then uses only a fraction of the bandwidth. This is why it is often used in small
networks center, where there are only a few of the devices connected to it or computers.
However, the hub is not necessary if there are only two of the computers in the network. In this
case, you can use a direct cable connection or a wireless connection to connect two computers.
Switch serves as a central connection point in the network. But when the switch receives a
packet from the sending computer, it examines the destination address from the top of the
package and returns the package to the destination computer. This is possible because the shift
maintains a table that translates each of the ports with the MAC addresses of all devices
connected.
Using a switch, you can use the full bandwidth by each computer connected. Use a switch
instead of the hub. Switch is not always a separate device, often integrated with the router.
Modem
Modem means changer - Abstract. At the end of the transmission, a regulated carrier with
modem data (baseband signal) to prepare it for transmission in the end, the carrier is
demodulated modulated (ie, converted to its original shape) and the data is extracted. Modem
also performs other functions, such as converting digital-to-analog/analog-to-digital,
compression / decompression, and error correction, and encryption / decryption.
If you want to connect to the internet then you must connect the modem to the computer or
install modem inside your computer. Modem type you need depends on the method you choose
Internet access. You may be a voice band modem, cable modem, a DSL modem or a GPRS
Access point
Access point for wireless LAN (Wi-Fi) and serve as a switch to a wired network. It connects to
computers or devices to create a wireless network. Access points more also serve as a wireless
network bridge that connects Wi-Fi network to a wired network such as Ethernet. Access point
provides an interface to an ADSL modem or router that is used when the Wi-Fi network to
connect to the Internet. Some access points in the version that integrates Multi switch function, a
bridge, router or broadband modem.
Networking cables
Networking cables are used to connect network drivers, such as printers, scanners, nodes etc.
different types of network cables like coaxial cable, fiber optic cable, twisted pair cables are used
depending on the networks topology.
Coaxial cable
Thin Ethernet
BNC connectors
This is a connector for coaxial cables that locks when one connector is inserted into another and
rotated 90 degrees
RJ45
RJ45 is a type of standard network cable. It‟s most often seen with RJ45 Ethernet cables and
networks Have eight-pin RJ45 connectors with wire strands of a cable interface electrically. RJ-
45 standard pin out define the layout of individual son necessary when fixing the cable
connectors
Different kind of hardware‟s and software‟s needs to the installation of a local area network, for
the installation generally requires an interface card into its system unit. In this interface card
includes number of ROM modules and specialized circuits as well as microprocessor
But in some local area network one personal computer must be reserved to process the network
commands and functions because it services these commands and functions, it‟s calling as “the
network server” although the term” file server” is also commonly used to reference this computer
To communicate over a network, you must use the computers select the appropriate operating
protocol for the network. This protocol allows the computer to exchange information and ensure
the correct data transfer. Network operating system (NOS) is a control program that allows the
server to receive and provide multiple network clients to communicate with each other. Network
protocols most commonly used products support follows: · TCP / IP - Unix, Windows NT ™
Server, Linux, and Internet products.
NIC drivers
Network interface card (NIC) drivers are computerized instructions and information required to
obtain a NIC card to be operational after it is installed within or connected to a computer. These
instructions are usually by computer programmers who may be highly proficient program in a
variety of programming languages such as C or C + +. NIC card is a device, and can be thought
of device drivers and computer code or machine language that "drives" or devices make it work.
Windows firewall
Windows Firewall is a component of the Microsoft Windows program that provides firewall and
packet filtering functions. Included for the first time in the operating system Windows XP and
Windows Server 2003. Before the release of Service and Windows XP Pack 2 in 2004, known as
the Internet Connection Firewall.
Communications protocol is a system of digital formats and message rules to exchange those
messages or between computing systems and telecommunications. Protocol may be formal
description. Signals may include protocols, authentication and error detection and correction
capabilities.
Virus guard
Virus Guard is actually two programs (Active Shield and viruses), and are available at no extra
cost for you as a client Verizon broadband.
Active Shield works in the background to protect your computer from viruses that can reach in
the e-mail or through other means of transferring files (for example, floppy disk, CD, and instant
messaging). It helps to prevent the virus, worm, or spyware from infecting your computer.
Viruses are used to examine the drive, folder, or file for viruses, worms, and spyware. Test site
configuration options used while conducting the examination, and take action if found to viruses,
worms and spyware. McAfee removes viruses, worms, and spyware that infected your computer.
Application software
Application is a program or set of programs designed for end-users. And application software
can be divided into two general categories: systems software and applications. Systems program
consists of low-level programs that interact with the computer at a very basic level. This includes
operating systems, compilers, and utilities for managing computer resources.
In contrast, a software application (also called end-user programs) includes database programs,
word processing, and spreadsheets. Figuratively, and applications software sits on top of systems
software because it is unable to run the operating system without and system utilities.
Hardware Cost
Total 7445000.00
Device Description
HDD 2 GB SATA
VGA card
VGA Card Geforce
FX6200A
Device Description
HDD 2 TB SATA
VGA card
VGA Card Geforce
FX6200A
SQL 86 10000
860000.00
79 20000 1580000.00
Anti virus
Total cost 4270000.00
Esoft Computer Studies Pvt (Ltd) institute just acquires a new building which is having four
floors. Esoft is going to set up a network to create a local area network to ease out day to day
operations.
Esoft is Local Area Network here I suggest to use physically star topology and logically
Ethernet. So here we want to use servers also mainly I used proxy server because a proxy is
actually a server which helps us maintaining our privacy on the Internet. It is just like a wall
between you and the Internet. When you use a proxy, the webpage on the other side won‟t be
able to see you, webpage interacts with the proxy and proxy in return shows us the webpage. In
this way a proxy server works. Here we can use free proxy. And I used web server (h/w) inside
web server I install email server (s/w) and printer server (s/w). Using this web server we can
In first floor I used DHCP server. Because using this DHCP server we can protect our computer
IP address. It will change automatically. We can protect our computers form hackers.
In this building each and every floor we want to use severs. So in second floor I thought to use
database server (h/w) inside I install backup (s/w) and virus guard. Because in Esoft student can
do online exam using this database server. It‟s very useful to Esoft. And I install backup (s/w)
because using this we can get backup and I install virus guard because we can protect computer
in virus. And I use primary domain controller server (h/w) because if we need to remove client
machine logically we can use primary domain controller server. In this server there is no local
account.
In 3rd floor I used file server. Using this server we can send and receive file. It‟s most advantage
to Esoft. Inside file server I install backup s/w and virus guard s/w. It‟s very useful to Esoft. And
I install backup (s/w) because using this we can get backup and install virus guard because we
can protect computer in virus.
In 4th floor I used DHCP server. Because using this DHCP server we can protect our computer IP
address. It will change automatically. We can protect our computers form hackers. Inside DHCP
server I install backup s/w and virus guard s/w. It‟s very useful to Esoft. And I install backup
(s/w) because using this we can get backup and install virus guard because we can protect
computer in virus.
What is a workstation?
A workstation is a standalone computer that is the primary user interface for day-to-day work.
The workstation is called a client when it requests network service or access to network
resources
Workstation hardware includes the computer itself and the network interface card that connects.
The workstation support network and physical network hardware provides data communication
signals. To interpret workstation Signal as meaningful messages and other network devices must
install two types of software components such as software and workstation software network
connectivity.
Workstation software
The workstation software differs depending upon the OS installed on each computer. All
versions of the local workstation software have generally the same requirements to provide a
user interface and to request and access network resources. The workstation software provides
the user interface while network connectivity software enables communications with the
network.
What is a Server?
A server is a computer dedicated to providing some particular service for other computers on the
network and also a server is a computer system whose primary purpose is to host files and/ or
applications and provide access to them on a network. The counterpart to a server is a client.
Server can share resources with several clients.
Network components
A network is made up of many independent and interdependent entities that, when working
properly can request, provide and share network resources
Network interface cards (NIC): that connects each device to a physical medium, transmit and
receive signals. Each NIC is connected to a copper or optical fiber by means of cable
Protocols: that allows data transport and communication between server, workstation and
peripheral devices.
Peripheral devices: Those are shared network recourses too expensive to connect to individual
workstations for example high capability or color printers, fax machine shared disk storage and
CD rom devices can be shared by many workstations.
3.1. Draw suggested topology and network devices for each floor to meet the given specification for above case study. In this
diagram you must show devices Cleary. DHCP server h/w,
Virus guard s/w, Client pc, 15 computers
backup s/w
SWITCH
SWITCH SWITCH
SWITCH
Client PC Client PC
Client PC
HUB
Client PC SWITCH
Client PC
Client PC
Client PC
DHCP Server
Client PC
Client PC Client PC
Client PC
HUB
SWITCH
Client PC
Primary domain
controller
Client PC Client PC
Client PC
Client PC
Data base
Client PC Client PC
Client PC
HUB
SWITCH
Client PC
External Storage
Client PC Client PC
Client PC
Client PC
File server
Client PC Client PC
Client PC
HUB
Client PC SWITCH
Client PC
Client PC
Client PC
DHCP Server
Client PC
Bandwidth
The amount of data that can be transmitted in a fixed amount of time. For digital devices, the
bandwidth is usually expressed in bits per second(bps) orbytes per second. For analog devices,
the bandwidth is expressed in cycles per second, or Hertz (Hz)..Let‟s take a example when
connecting to the internet using a modem the compute may connected at 28.8 Kbps which is
referred to as kilobits per second the more the bandwidth it has the more faster it can be
connected. The more the bandwidth he more information it can carry per second than one with
less bandwidth. A modem which has 56Kbps is much faster than a 28.8kbps; even with the
broadband connection we can get even faster transfer speed up100Mbps in which is faster than
the two speeds combines together.
Quality is the factor where we measure how worth the product is for the usage of the institution
whether it is up to standard and fulfills user requirements.
Using IBM system x3400 M3 server, it is a high performance server so institute can
provide better service to client
Scalability
scalability means if we can expand this network or not. Her we can easily expand our networks.
Because we are using star topology and we using switches to expand the networks.
Security
In the field of networking, the area of network security consists of the provisions and policies
adopted by the network administrator to prevent and monitor unauthorized access, misuse,
modification, or denial of the computer network and network-accessible resources. Network
security is the authorization of access to data in a network, which is controlled by the network
administrator. Users are assigned an ID and password that allows them access to information and
programs within their authority. Network Security covers a
variety of computer networks, both public and private that are
used in everyday jobs conducting transactions and
communications among businesses, government agencies and
individuals.Antivirus or anti-virus software is used to prevent,
detect, and remove malware, including but not limited to
computer viruses, computer worm, Trojan horses, spyware
and adware. This page talks about the software used for the
prevention and removal of such threats, rather than computer
security implemented by software methods.
4.1. Implement a network system based on the design you have prepared under task 3.1.
(Note: installation of communication devices, allocation of address, local client
configuration, server configuration server installation with screen shots).
1st step
You need to insert the windows server 2008 CD into your DVD drive.
2nd step
3rd step
You can choose the language, the time and the keyboard you prefer and click next to continue
the installation
Once the setup is installing what we have to do is if any pre existing data have in our hard drive
now we should remove it off
6th Step
Now that we should choose what edition of server we have there is a special DVD edition we
should choose server 2008 or standard full installation and then click next
8th step
Install it where you want it to get installs. If you find any other servers delete it off and then click
next.
11th step
13th step
Now we should change the name of the computer with whatever the name is given into the name
Server and it will immediately ask you to restart your computer
Once we immediately log in again we should configure the networking we should make sure that
the IP address doesn‟t change.
15th step
To update this server we should give the configuration as unable automatic updating and
feedback and then you‟re done with it.
"IP" stands for Internet Protocol, so an IP address is an Internet Protocol address. What does that
mean? An Internet Protocol is a set of rules that govern Internet activity and facilitate completion
of a variety of actions on the World Wide Web. Therefore an Internet Protocol address is part of
the systematically laid out interconnected grid that governs online communication by identifying
both initiating devices and various Internet destinations, thereby making two-way
communication possible.
An IP address consists of four numbers, each of which contains one to three digits, with a single
dot (.) separating each number or set of digits. Each of the four numbers can range from 0 to 255.
Here's an example of what an IP address might look like: 78.125.0.209. This innocuous-looking
group of four numbers is the key that empowers you and me to send and retrieve data over our
Internet connections, ensuring that our messages, as well as our requests for data and the data
we've requested, will reach their correct Internet destinations. Without this numeric protocol,
sending and receiving data over the World Wide Web would be impossible.
1st step
In windows 8 desktop bottom you should right click the network icon and click the “open
network and sharing center”
2nd step
Once you get the network connections box right click your connection
4th step
Once you right click your connection go to properties and go to bottom choose internet protocol
version 4 and then click properties
If you want to obtain an IP address automatically you can click that option
6th step
If you want to statically assign your IP address you can choose the “use the following option”
radio button and assign your IP address and click OK
Test case
02 Network connectivity
The ping test for own pc( Successfully ping Successfully ping Pass
type ping 192.1.1.3 on
command)
03
Do routers show paths you Successfully traced Successfully traced pass
expect?(type tracer on
command prom pert )
O4 Successful Successful
DHCP handing out addresses pass
After typing “ping” it will display all the instructions how to use ping
Then we will receive the IP address of that machine, Packets lost, packets sent etc…
After that type IPCONFIG and enter, it will display the internet connection type, IP
address, Subnet mask and if we have more than one network card it will show them.
Now day‟s technologies are getting advance in day to day life. It‟s very important to us. So we
should want to know about current technologies and we want to familiar with these technologies.
In future the technologies can be advance. Now we are using internet all over the places. So in
future we can get high speed internet connect that‟s called “internet 2”. Using this internet2 we
can access web browser very quickly.
If Esoft expand their network they should want to use very powerful cables. So they can use fiber
optic cable. Using this cable they can quickly transfer the data‟s. But it‟s cost. So we want to
spend more money to fiber optic cables.
We can use wireless technologies. It‟s helpful to us. It‟s very easy to configure the networks
also. For wireless technologies examples; router, wifi, wimax, wireless mousses, wireless
keyboards, irDA and Bluetooth etc......
Using router we can access the internet. Without cables and wifi also like same using wifi we can
access the internet in anywhere. And wireless mouse and wireless keyboards are most
advantages. We no need to use wires we want to use only small USB, using this USB we can
connect keyboard and mouse to computers. Using this kind of wireless technologies we can save
more spaces. “irDA” (Infrared Data Association) this is a wireless technology. The main reason
for using IrDA had been wireless data transfer over the “last one meter” using point and shoot
principles. Thus, it has been implemented in portable devices such as mobile phones, laptops,
cameras, printers, medical devices and many more. is WiMAX (Worldwide Interoperability for
Microwave Access) WiMAX is an IP based, wireless broadband access technology that provides
performance similar to 802.11/Wi-Fi networks with the coverage and QOS (quality of service) of
cellular networks.
Cloud computing entrusts remote services with a user's data, software and computation. Cloud
computing is the use of computing resources (hardware and software) that are delivered as a
service over a network (typically the Internet).
Update/Testing
Services Occurrence Start Duration Impact
Affected
Windows Monthly 10:00pm 5hrs This means various
Desktop servers will be down
Updates throughout the night
for 5-20 minutes. All
Windows servers will
need to be restarted
after update.
Windows Monthly 11.30:pm 2hr This means various
Server 2008 servers will be down
Updates for 5-25 minutes.
All windows servers
2008 will need to be
restarted after update
Firewall Monthly 12.30:00am 30mins All servers behind the
Updates firewall will be
inaccessible during
the update.
DNS Server Monthly 1:30am 1hrs IP addresses will not
Updates be mapped while the
DNS server is being
updated.
Virus Nightly 2:30am 3hrs Individual desktops
Protection may run slower while
Software virus updates are
Updates being performed on
it.
Critical appraisal attempts to identify the strengths and weaknesses of pieces of information,
often research literature, so that readers may apply that information within the limits identified.
As this assignment has bought ll our strengths and weaknesses in understanding the subject I
have overcome all of the weaknesses and completed this assignment successfully.
Strengths
Positive attributes currently present, which enables successfully completion on current or future
project tasks.
Ability to identify problems and apply concepts, techniques in order to overcome those
problems. Ability to change directions quickly.
Work Experience and Strong technical knowledge within the fields of hardware, software and
networking.
Commitment to spend plenty of time for gets the required tasks done.
Weaknesses
Local issues or characteristics, that limit the past, current or future project tasks.
Future enhancements
Assessment Criteria
(Task 2.2)
P3.2 Evaluate the above Evaluate the above design and analyze
design and analyze user user feedback.(Task 3.2)
P4.1 Implement a
networked system based
on a prepared
design
systems