Professional Documents
Culture Documents
Networking Technology: Velusamy Dharshika
Networking Technology: Velusamy Dharshika
Velusamy Dharshika
NETWORKING TECHNOLOGY
Contents
List of Figures...........................................................................................................................3
List of Tables............................................................................................................................5
Task: 01.....................................................................................................................................6
1.1 Networking.......................................................................................................................6
1.3.2 Topologies...............................................................................................................12
Task: 02...................................................................................................................................22
2.1 Network standards..........................................................................................................22
2.1.8 Ethernet....................................................................................................................25
2.1.9 WAP.........................................................................................................................25
2.1.11 WIMAX.................................................................................................................27
2.1.12 Wi–Fi.....................................................................................................................28
Task: 03...................................................................................................................................30
3.1 Importance of different protocols in data communication.............................................30
Task: 04...................................................................................................................................37
4.1 Design a Network for Flexi Lease Finance (Pvt.)..........................................................37
Task – 05.................................................................................................................................41
5.1 Role of Software and Hardware Components................................................................41
5.1 Hubs............................................................................................................................41
5.2 Routers........................................................................................................................42
5.3 Switch.........................................................................................................................43
5.4 Gateways.....................................................................................................................43
Task: 06..................................................................................................................................46
6.1 Servers............................................................................................................................46
Task: 07...................................................................................................................................50
Task: 08...................................................................................................................................55
10.1 Feedbacks.....................................................................................................................55
Task: 09...................................................................................................................................58
9.1 Test Results....................................................................................................................58
Task: 10...................................................................................................................................71
10.1 Security, Bandwidth, Quality.......................................................................................71
Task – 11.................................................................................................................................73
11.1 Maintain Schedule for Week (Flexi Lease Finance (Pvt.) Ltd.....................................73
Appendix - A...........................................................................................................................76
References...............................................................................................................................77
List of Figures
Figure 1(Network)......................................................................................................................6
Figure 2(LAN)...........................................................................................................................7
Figure 3(MAN)..........................................................................................................................8
Figure 4(WAN)..........................................................................................................................9
Figure 5(Bus)...........................................................................................................................13
Figure 6(Mesh).........................................................................................................................15
Figure 7(Star)...........................................................................................................................16
Figure 8(Tree)..........................................................................................................................17
Figure 9(Network Standards)...................................................................................................22
Figure 10(WIMAX).................................................................................................................27
Figure 11(Network Infrastructure)...........................................................................................37
Figure 12(Devices)...................................................................................................................41
Figure 13(Hub).........................................................................................................................42
Figure 14(Routers)...................................................................................................................42
Figure 15(Switch).....................................................................................................................43
Figure 16(Loan Department)....................................................................................................52
Figure 17(Saving Department).................................................................................................53
Figure 18(Pawning Department)..............................................................................................54
Figure 19(Leasing Department)...............................................................................................54
Figure 20(Install Windows).....................................................................................................59
Figure 21(Operating System)...................................................................................................59
Figure 22(License Terms)........................................................................................................60
Figure 23(custom (advanced)).................................................................................................60
Figure 24(Drive Options).........................................................................................................61
Figure 25(Disk Drive Partition)...............................................................................................61
Figure 26(Installing Windows)................................................................................................62
Figure 27(Login Form)............................................................................................................62
Figure 28(IP address)...............................................................................................................63
Figure 29(Server Manager)......................................................................................................64
Figure 30(Add Roles Wizard)..................................................................................................64
Figure 31(Active Directory Domain Services)........................................................................65
Figure 32(Add Roles Wizard)..................................................................................................65
List of Tables
Table 1(Feedback – Department Head)...................................................................................56
Table 2(Feedback - Employee)................................................................................................56
Table 3(Feedback – Department Head)...................................................................................57
Table 4(Feedback - Employee)................................................................................................57
Task: 01
1.1 Networking
1.1 What is a network?
The interconnection of two or more computers and hardware devices by physical and logical
means with the help of hardware devices and software is called networking.
A network consists of two or more computers that are linked in order to share resources (such
as printers and CD-ROMs), exchange files, or allow electronic communication. The computer
on a network may be linked through cables, telephone lines, radio waves, satellites, or
infrared light beams.
Before applying the network types to the Flexi Lease Finance (Pvt.) Ltd, let me give you an
idea of the available type on networks.
Figure 1(Network)
A Local Area Network (LAN) is a network that is confirmed to relatively small area ,
generally limited to geographic area such as writing lab, Scholl, building.
Rarely are LAN computers more than a mile apart in a typical LAN configuration,
one computer is designed as the file server and stores all of the software that controls
the network.
The workstations can be less powerful than the file server and they may have
additional software on their hard drivers.
Figure 2(LAN)
When a new version comes out, it only has to be loaded onto the server instead of
onto every workstations.
1.2.1.2 Disadvantages of LAN
Special security measures are needed to stop users form using programs and data that
they should not have access to.
Networks are difficult to set up and need to be maintain by skilled techniques.
If the file sever develops a serious fault, all the users are affected, rather than just one
user in the case of stand – alone machine.
A Metropolitan Area Network (MAN) covers larger area, such as cities or school,
districts.
Local libraries and government agencies often use a MAN to connect to citizens and
private industries.
One example of a MAN if the MIND network located in Pasco country, Florida. It
connects all of Pasco’s media centers to centralized mainframe at the district office by
using dedicated phone lines, coaxial, and wireless compunctions providers.
Figure 3(MAN)
Wide Area Network (WAN) connect larger geographic areas, such Florida, the United
Sates, or the world.
Using WAN schools in Florida can communicate with paces like Tokyo in a matter of
minutes, without paying enormous phone bills.
Figure 4(WAN)
I would like to recommend LAN network to Flexi Lease Finance (Pvt.) Ltd. Because the
relatively small area and limited to geographic area. This is the main reason to chosen this
type of the network. Here I have given some of other reasons as well.
A local area network is a network that is confined to. It is generally limited to a
geographic.
As technology advances in society the need for wired and wireless networking has become
essential. Each of these types of networking has their advantages and disadvantages
according to security. Wired networking has different hardware requirement and the range
and benefits are different. Wireless networking takes into consideration the range, mobility,
and the several types of hardware components needed to establish a wireless network.
Wired networks, also called Ethernet networks, are the most common type of local
area network (LAN) technology.
Ethernet is the fastest wired network protocol, with connections speed of 10 megabits
per second (Mbps) to 100 Mbps or higher.
Wired networks can also be used as part of other wired and wireless networks.
To connect a computer to a network with the Ethernet cable, the computer must have
an Ethernet adapter (sometimes called a network interface card or NIC).
There are in network topologies that are most commonly used today.
1.3.2 Topologies
Network topology describe the ways in which the elements of a network mapped. They
describe the physical and logical arrangement of the network nodes
The types of topologies are;
Logical Topology: Physical topology should not be confused with logical topology
which is the method used to pass information between workstation.
A linear bus topology consists of a main run of cable with a terminator at each end.
All the nodes (file, server, workstations, and peripherals) on bus topology are
connected by one signal cable.
A bus topology consists of a main run of cable with a terminator at each end. All
nodes (file, server, workstations, and peripherals) are connected to the linear cable.
Figure 5(Bus)
Each devices on the network “sees” all the data being transmitted, thus posing a
security risk.
A failure in any cable or device breaks the loop and can take down the entire network.
A token or small data packet, is continually passed around the network. When a
device needs to transmit, it reserves the token for the next trip around, then attaches
its data packet to it.
Data sent form one node to another has to pass through all the intermediate nodes.
This makes the transmission slower in comparison to that in a star topology. The
transmission speed drops with an increase in the number of nodes.
There is heavy dependency on the wire connecting the network nodes in the ring.
In this type of network, each node may send message to destination through multiple
paths.
Figure 6(Mesh)
The arrangement where in every network node of connected to every other node of
the network, many connections serve no major purpose. This leads to redundancy of
many network connections.
A lot of cabling is required. Thus, the costs incurred in setup and maintenance are
high.
Star topology
The star network, a general more simplistic type of topology, has one central hub that
connects to three or more computers and the ability to network printers.
This type can be used for small business and even home networks.
The star network is very useful for applications where some processing must be
centralized and must be performed locally.
The major disadvantage of the star network is all data must pass through one central
host computer and if that host fails the entire network will fail.
Figure 7(Star)
Adding or removing network nodes is easy, and can be done without affecting the
entire network.
Due to the centralized nature it is easy to detect faults in the network devices.
As the analysis of traffic is easy, the topology poses lesser security risk.
Data packets do not have to pass through many nodes, like in the case of a ring
network. Thus, with the use of a high capacity central hub, traffic load can be handled
at fairly decent speeds.
Figure 8(Tree)
Tree topology
A tree topology (hierarchical topology) can be viewed as a collection of star networks
arranged in hierarchy.
This tree has individual peripheral nodes which are required to transmit to and receive
from one other only and are not required to act as repeaters or regenerators.
The tree topology arranges links and nodes into distinct hierarchies in order to allow
greater control and easier troubleshooting.
This is particularly helpful for colleges, universities and school so that each of the
connection to the big network in some way.
Ethernet
Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access /
Collision Detection).
This is a system each computer listens to the cable before sending anything through
the network.
If the network is clear, the computer will transmit. If some other node is already
transmitting on the cable, the computer will wait and try again when the line is clear.
The Ethernet protocol allows for liner bus, star, or tree topologies. Data can be
transmitted over twisted pair, coaxial or fiber optic cable at a speed of 10 mbps up to
1000 Mbps.
Local Talk
Local Talk is a network protocol that was developed by Apple Computer, for
mackintosh computers.
The method used by LocalTalk is called CSMA/CA (Carrier Sense Multiple Access /
Collision Avoidance).
It is similar to CSMA/CD except that a computer signals its intent to transmit before it
actually does so.
The Macintosh operating system allows the establishment of peer to peer network
without the need for additional software. With the addition of the server version of
AppleShare software, a client/ server can be established.
The Local Talk protocol allows for liner bus, star or tree topologies using twisted pair
cable.
ATM
Asynchronous Transfer Mode (ATM) is a network protocol that transmit data at a
speed of 155 Mbps and higher.
ATM works by transmitting all data in small packets of a fixed size, whereas, other
protocols transfer variable length packets.
ATM supports a variety of media such as video, CD – Quality audio, and imaging.
ATM employs a star topology, which can work with fiber optic as well as twisted pair
cable.
ATM is most often used to interconnection two or more local area networks.
It is also frequently used by Internet Service Providers to utilize high speed access to
the internet for their clients.
Now let’s discuss which topology is suitable for the Flexi Lease Finance (Pvt.) Ltd Company
and why it has chosen for this Flexi Lease Finance (Pvt.) Ltd Company and why other
topologies did not chosen for this company.
I would like to recommend star topology to Flexi Lease Finance (Pvt.) Ltd Company.
Already we have discussed above section but here there are given some of extra details about
this topology and there are given some reason to choose of this topology.
Star Topology
The reasons why star topology model was selected
Data packets do not have to pass through many nodes, like in the case of a ring
network. Thus, with the use of a high capacity central hub, traffic load can be handled
at fairly decent speeds.
The main reason to select to Flexi Lease Finance (Pvt.) Ltd Company is, it has 2 floors and
there are in different types of departments. Definitely it should have the communication each
and every departments. Each departments can easy way to communicate and easy to install
and wire. If some time it gets any problems easy to detect faults and or remove the parts
without affecting the other devices on the network. This really flexibly for them.
There is another very big advantage on this topology that is if the data packets are sent
quickly as they do not have to travel through any unnecessary nodes. Here the Flexi Lease
Finance (Pvt.) Ltd Company can have some different types of procedure to maintain the files
and documentations at the point they should to need quick responses, that’s why this could be
suitable topology for them. It performance is greater with speeds capable of 10mbps to
100mbps or more.
Let us describe why we DID NOT choose other available topologies.
Entire network shuts down if there is a break down in the main cable.
Tree Topology
Mesh Topology
The arrangement where in every network node of connected to every other node of
the network, many connections serve no major purpose. This leads to redundancy of
many network connections.
A lot of cabling is required. Thus, the costs incurred in setup and maintenance are
high.
Task: 02
2.1 Network standards
Before we go the task we should analysis all over the network standards and technologies.
2.1.1 What is the Network Standards
Network standards are rules that govern the exchange of messages between hardware
or software process on different hosts, including messages (ordering, semantics, and
syntax), reliability, and connection oriented.
These are some common standards in networking;
International Organization for Standardization (ISO).
International Telecommunication Union (ITU).
Institute Electrical and Electronics Engineers (IEEE).
Electronic Industries Alliance / Telecommunications Industry Association
(EIA / TIA).
Communications Information Technology Association (CITA).
European Telecommunications Standards Institute (ETSI).
Markets did not respond as predicted, and flat sales growth of wireless networking
components prevailed through most of the 1990s.
Relatively low data rates, high prices, and especially the lack of standard kept many
end users form purchasing the wire –free forms of media.
2.1.3 International Organization for Standardization (ISO)
ISO is a collection of standards organizations representing 130 countries.
ISO’s goal is to establish international technological standards to facilitate global
exchange of information and barrier – free trade.
Implemented at the MAC sublayer of the OSI/RM data link layer (Layer 2).
ATM employs a star topology, which can work with fiber optic as well as twisted pair
cable.
ATM is most often used to interconnection two or more local area networks.
It is also frequently used by Internet Service Providers to utilize high speed access to
the internet for their clients.
P2P advantages:
Cost – Because P2P networks are used on the internet, an existing, reliable
infrastructure is already in place.
2.1.8 Ethernet
Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access /
Collision Detection).
This is a system each computer listens to the cable before sending anything through
the network.
If the network is clear, the computer will transmit. If some other node is already
transmitting on the cable, the computer will wait and try again when the line is clear.
The Ethernet protocol allows for liner bus, star, or tree topologies. Data can be
transmitted over twisted pair, coaxial or fiber optic cable at a speed of 10 mbps up to
1000 Mbps.
2.1.9 WAP
WAP is published by the WAP forum, founded in1997 by Ericson, Motorola, Nokia,
and Unwired Planet.
Forum members now represent over 90% of the global handset, software developers
and other organizations.
The wireless Application Protocol is a standard, specifically a protocol that specifies,
how some mobile devices such as smart phones can display the content of internet
services such as the web, email, and chat rooms.
WAP is the set of rules governing the transmission and reception of data by computer
application on or via wireless devices like mobile phones.
WAP allows wireless devices to view specifically designed pages form the internet
using only plain text and very simple black and white pictures.
2.1.10 Bluetooth Technology
Bluetooth technology is leading the future of wireless connections between different
technological devices.
Bluetooth is built into a variety of different devices including; phones, headsets, and
even medical equipment.
It lets you make calls, listen to music, and send all kinds of information wirelessly,
without and cable connection.
Data exchange without wires is the staple of Bluetooth technology.
Its only limitation is that can be used effectively over a maximum distance of 100
meters.
It can also be used to connect to LAN networks (Local Area Network).
These chips were designed to take all of the information that the wires
normally send, and transmit it at a special frequency to something called a
receiver Bluetooth chip.
Easy to install.
It is wireless.
2.1.11 WIMAX
WIMAX stands for Worldwide Interoperability for Microwave Access.
WiMAX refers to broadband wireless networks that are based on the IEEE 802.16
standard, which ensures compatibility and interoperability between broadband
wireless access equipment.
It combines the familiarity of Wi-Fi with the mobility of cellular that will deliver
personal mobile broadband that moves with you.
Figure 10(WIMAX)
2.1.12 Wi–Fi
Wi-Fi (Wireless Fidelity) is the technology that allows to connect the internet at fast
speeds without using wires.
It also allows users to create their own LAN (Local Area Network) and conduct
wireless data transmission between different network elements.
The first wireless LANs came into being in 1994 but it was very expensive and this
blocked its development.
In 1997 IEEE (the institute of Electrical and Electronic Engineers) worked out the
802.11 standard. However people forgot about it very soon because of low capacity.
In 1999 IEEE introduced the 802.11b standard which brought higher capacities.
Wi-Fi uses unlicensed radio spectrum and does not require regulatory approval for
individual deplores.
It allows local area networks (LANs) to be setup with cabling.
The can reduce associated costs of network connection and expansions.
When Wi-Fi enabled device encounters a hotspot the device can then connect
to that network wirelessly.
A single access point can support up to 30 users and can function within a
range of 100-150 feet indoors and up to 300 feet outdoors.
Many access points can be connected to each other via Ethernet cables to
create a single large network.
Now let’s start to choose the proper network technology to Flexi Lease Finance (Pvt.) Ltd. I
would like to recommend Wi-Fi technology is the suitable for this company.
The reason why I have chosen this technology is very first reason is easy of communication.
Wi-Fi allows users to stay connected all of the time. In this business is able to maintain a
consistent flow of communication in the different types of departments at Flexi Lease
Finance (Pvt.) Ltd. In this organization should have the communication each and every
employees as well as available departments. This factor is increased productivity, allowing
employees to collaborative where and when need to them. It brings freedom of operation and
speeds up the working process.
Another factor is cost. Cost is the main power of the company. Using wireless technology
rather than having a hard wired network can be much more cost – effective. The larger the
network company, both in terms of area and users, the more expensive a hard wired network
will be to install. It is not just the amount of cabling, but the actual cost of the labour to
install, and chase the cabling all through the premises; through walls, up and down different
floors. This Wi-Fi allows to quickly install the technology anywhere in their facility build a
secure that can support of their employees. Wi–Fi is easy to expand and can take on
additional users with existing equipment, unlike wired cables which require additional wiring
and installation. These are the main reasons to chosen this technology to Flexi Lease Finance
(Pvt.) Ltd.
Task: 03
3.1 Importance of different protocols in data communication
Communication protocols are basically all of the communications between the devices,
protocols in general are a pre-defined sets of rules which are used to split data up in order for
it to be sent in a particular way.
The following reasons are why communication protocols are important.
Private communication capabilities.
Authentication messages.
Error checking.
Breaking up data into blocks, also known as “packets”
Listed above this are some of the main functions for some of the protocols in the TCP/IP
suite. There is also some extra importance what communication protocols bring, without all
of the things listed below there would be no organized, or any secure types of communication
occurring between any computers in the network, or even the internet.
Many of the protocols included inside the TCP/IP suite control how the computers send
messages, how to handshake, and this also includes repairing broken and incomplete
messages. Listed below are some of the main functions of communication protocols, and
what makes them important
Detection of the network connection, it can be wireless or wired;
Handshaking.
How to for format communication messages.
How to send and receive messages.
Handle various connections.
Correction of broken and incomplete messages.
Termination of the session, or connection.
All of the above manage and tell the computers how to send and receive data, without this
there would be not communication between the computers at all. This is all one through
protocols, these are the pre-define rules set, to let the computers communication in an
unformed way. If these did not exist, then the computer system would not be able to run in a
network, or do any forms of communication in a networked level. Also, the protocols prevent
errors occurring, and if they do then they can also be prepared, which prevents the same data
being sent again, and again using up bandwidth when it isn’t needed.
Messages destined for some other host are not passed up to the upper layers but are
forwarded to another host.
The seven layers in OSI are described below.
All application and utilities that communication with network fall in this layer.
For Example;
It takes data from application layer and mark it with formatting code such as. Doc,
jpg, txt etc.
These file extension make it easy to realize the particular file is formatted with
particular type of application.
With formatting presentation layer also deals with compress and encapsulation. It
compress or decompress the data file.
This layer can also encapsulate the data, but it’s uncommon as this can be handle by
lower layers more effectively.
Session layer also synchronizes dialogue between the presentation layers of the two
hosts and manages their data exchange.
For example, web servers may have many users communicating with server at a given
time. Therefore, keeping track of which user communication on which path is
important and session layer handle this responsible accurately.
Segment,
Connection management
Reliable and unreliable data delivery.
Flow control.
Connection multiplexing.
Define IP address.
Find routes based on IP address to reach its destination.
Connect different data link type together like as Token Ring, FDDI, Ethernet
etc.
It is responsible for the control of the signals that enter and leave the network cable.
On the receiving end, the data link layer packages raw bits from the physical layer
into data frames.
This layer receive frame from data link layer and convert them in bits.
It load these bits on actual communication media. Depending on media type these bit
values are converted in single.
Some use an audio tones, while others utilize state transitions – change in voltage
form high to low and low to high.
Specific protocols are needed for each type of media to explain the protocol but
patterns to be used, how data is encoded into media signals.
The next section will tell you how this different types of protocols work on this Flexi Lease
Finance (Pvt.) Ltd company network. Let’s assume user an A sending email message to user
B in a network.
A packet of is a basic unit of communication over the network. A packet is also called a
datagram a segment, a block, a cell or a frame, depending on the protocol network. When
data has to be transmitted, it is broken down into similar structures of data, which are
reassemble to the original data chunk once they reach destination (From user A to B) when
user A sends his email message, the network breaks the e-mail message into parts of a certain
size in bytes. These are the packets. Each packet is then sent off to destination (User B) by
the best available route. A route might be taken by all the other packets in the message or by
one of the other packets in the message.
This makes the network more efficient. First, the network can balance the load across various
pieces of equipment on a millisecond – by – millisecond basis. Second, it there is a problem
with pieces of equipment in the network while message is being transferred, packets can be
route around the problem, ensuring the delivery of the entire message.
In the same process, if there are other people sending a message on the network at the same
time when user A is sending his email message going to user B, the whole messages will be
in a queue in the order they were and will be delivered to their various destinations.
Each packet carries the information that will help it get to user B (destination) user A IP
address, user B IP address, something that tells the network how many packets this e-mail
message has been broken into and the number of this particular packet.
The packets carry the data in the protocols that the internet uses. Transmission Control
Protocol / Internet Protocol (TCP / IP). Each packet of the body of user an A message to user
B. A type packet contains perhaps 1000, 1500 bytes. When a server wishes to send data, it
uses the client network software to enclose the data in a packet containing a header and a
trailer.
The header and trailer contain information for the destination computer. For example, the
header contains the address of the of destination computer. The exact form the packets take is
determined by the protocol the network uses. When a data is put onto the network by a
server, each computer on the network examines the packet to see who it intended for. The
packet quickly dissipates if it is not recognized, allowing other packets to be send.
If we take the OSI model, packets travel form layer one to another as stated above. The
transport layer manages the end – to - end control for example, determining whether all
packets have arrived and error – checking. It ensures complete data transfer. The network
layer handles the routing of the data (sending it in right direction to the right destination on
outgoing transmissions and receiving incoming transmissions at the packet level), the
network layer does routing and forwarding. The physical layer also conveys the bit stream
through the network at the electrical and machine level.
It provides the hardware means of sending and receiving data on a carrier. The data link
layer provides synchronizes for the physical layer. The presentation layer, usually part of an
operating system, does the conversion pf incoming and outgoing data from one presentation
format to another for example, from a text stream into a popup window with the newly
arrived text. Sometime it is called syntax layer.
The application layer is where communication partners (different IP) are identified, quality of
service is identified, and user authentication and privacy are considered. The session layer
sets up, coordinates, and terminates conversations, exchange, and dialogues between the
applications at each when user A message is finally received by user B (destination).
Firewall
Server
Switch
1st Floor – Loan Department 1st Floor – Saving Department 2nd Floor – Pawning Department 2nd Floor – Leasing Department
Computers Computers
5U
5U
5U
Department Head Department Head Executives Executives Department Head Executives Department Head Senior officer
5U
Saving Department
There are four counters which has four computers and two printers. Also department head
and another two executives are there in three cabins. One photocopier is located.
2nd Floor
Pawning Department
This department have four counters with computers and department head and a senior
executive cabins are located near them. Further two bill printing printers attached to two
computers.
Leasing Department
This area has ten computers which also two all in one photo copiers. Also department head
and two senior officers reside in one partition.
Server Room
The core switch, router and the servers are located here. Network Administrators room also
located here as well.
Task – 05
5.1 Role of Software and Hardware Components
Network devices are components used to connect computers or other electronic devices
together so that they can share files or resources like printers or fax machines. Devices used
to setup a Local Area Network (LAN) are the most common type of network device used by
the public.
Figure 12(Devices)
5.1 Hubs
A device that connects the cables form computers and other devices such as printers
in an Ethernet local area network.
Hubs are used for star topology networks, but they are often used with other
configurations to make it easy to add and remove computers without bringing down
the network.
Smart hubs or switching hubs are often used to improve performance by managing
traffic.
There are two types of hubs; active and passive.
Passive hubs simply connect all ports together electrically and are usually not
password.
Figure 13(Hub)
5.2 Routers
Routers are highly intelligent devices that connect multiple network types and
determine the best path for sending data.
The advantage of using a router over a bridge is that data can take to get to its
destination.
Like bridges, they can segment large networks and can filter out noise.
However, they are slower than bridges because they are more intelligent devices; as
such, they analyze every packet, causing packet forwarding delays. Because of this
intelligence, they are also more expensive.
Routers are normally used to connect one LAN to another. Typically, when a WAN is
set up, there will be at least two routers used.
Routers are OSI network layer 3 devices.
5.3 Switch
A network switch is a computer networking device that connects network segment.
Low – end network switch appear nearly identical to network hubs, but a switch
contains more “intelligence” (and a slightly higher price tag) that a network hub.
Network switches are capable of inspecting data packets as they are received,
determining the source destination device of the packet, and forwarding it
appropriately.
Popular MAC address table on the basis of source MAC address of a frame.
Data link layer or layer 2 device.
A vital difference between a hub and a switch is that all the nodes connected to a hub
share the bandwidth among themselves, while a device connected to a switch port has
full bandwidth all to itself.
For example, if 10 nodes are communicating using a hub on a 10 Mbps network, then
each node may only get a portion of the 10 Mbps if other nodes on the hub want to
communicate as well.
But with a switch, each node could possibly communicate at the full 10 Mbps.
5.4 Gateways
A gateways is a network point that acts as an entrance to another network. On the
internet, in terms of routing, the network consists of gateway nodes and host nodes.
Host nodes are computer of network users and the computers that serve contents (such
as Web pages).
Gateway nodes are computers that control traffic within your company’s network or
at the your local service provider.(ISP)
5.5 Solution of the Flexi Lease Finance (Pvt.)
Before one can being to setup a Flexi Lease Finance (Pvt.)’s network they must first be sure
they have a network interface card, commonly referred to as a NIC. A NIC is a device that
connects a computer or other device to a network. For computers, the NIC is usually installed
in an expansion slot and has a chip that handles the physical and data- link layer of the
network communication.
To establish your network you will need a few key components. If you plan to access the
internet you will start your network off with a cable modem. This type of modem is designed
to operating using existing cable lines. Cable internet has a high bandwidth and can support
most, if not, all applications you will be using.
The second component is a router. A router is a device that routes data form one network or a
network. A router is connected to at least two networks, commonly two networks or network
and its ISP’s network. A router allow for everyone on the network to access the internet.
A switch device similar to a hub that enables the connection of multiple computers, access
points, and other network enables devices. The different between a hub and switch is that a
switch filters the data that passes through it and a hub does not.
These components have all been modified and are cable of establishing wireless networks. A
router can be purchased with wireless capability but a more efficient way of adding wireless
to Flexi Lease Finance (Pvt.) network is to simply add wired access point.
Another key component is a print server. A print server is used to connect printers to a
network to allow for network printing. The server will act as a buffer; string the messaging
and printing them in order of the queue. This device can drastically reduce the cost of
networking because now everyone can use the same printer without having a printer attached
to every computer.
Network software is needed to perform network functions. In a LAN, some type of network
software is typically installed in each computer on the network, and a network operating
system is run on the network servers. Two of the most common LAN networking packages
are Microsoft Windows (Windows 8.1) in NT. Functions of network software include file
transfer and real –time messaging, automatic formatting of e- mail, and creating directions
and unique addresses for each node. Management utilities such a problem detection,
performance analysis, configuration assistance, usage and accounting management (billing),
and network security are usually included in network software package.
Database servers are computers designed to provide a specific server to save data or
information of the Flexi Lease Finance (Pvt.) Ltd Company. This servers allow to use
inserting the details, deleting the details, updating the details and search the details. Each and
every functions will help to main the proper records. It could be more usable and very
security for the company.
FTP Sever
This is another important server for the Flexi Lease Finance (Pvt.) Ltd Company. FTP server
becomes necessary for business that mage their own network and need to establish file
transfer connection to facilities the exchange documents between company employees.
Already said in this company has different types of departments and employees are not
working together there are in different apartments, in this situation definitely we should t
implement this server to share the information into the FTP server, it could be the best
communicate way of this company. This not only for the employees other department head
should communicate the administration or sharing the important company dealings and the
reports. Which could be more right choice to the Flexi Lease Finance (Pvt.) Ltd Company.
Mail Server
One of the instant forms of business communication is email. But email has several downfalls
to go along with its benefits that make it a change way to send information. This mail server
is very important tool of the business. Because in this business they are making some
transection throw the mail. Not only for the transection as well as salary details, clients
record. One of the fast communication way is the email.
The very big advantage email has over the telephone in communication speed is that you can
send attachments with an email that contain important document or even a presentation to
clarity the message. I would recommended this is the best method of communication with
others.
Task: 07
All users of the Flexi Lease Finance (Pvt.) Ltd company will have their computers software
will be installed and configure according to the schema above and their network will be
setup.
Every department is in different subnet. There are three different subnets and they all
connected to each other through the main switch. This way all users of the company can
access their information on the net regardless of their departments.
Main switch is connected to the web server which is installed Windows 7 OS. Web server is
connected to the intent xDSL modem/Switch. Each subnet computers are connected to each
other through the Hub. Printer server is installed with Linux OS and web server is installed
There are more than one way of configuring a Network. For this task we will choose the
simplest way.
We need to create a workgroup and give it a specific Name.
When we take this company it has different types of departments each
departments is different type of category and the set of procedure are different and
if we take one department we need to add all computers with specific names to the
same workgroup. That way they will be able to communicate with each other in
same Workstation.
We need to activate the Routers and the Firewall capabilities.
File sharing (FTP) on this Network should be activated on each computer.
We can assign a Network Manager as an Administrator and users have specific
names using a specific Network software.
Administrator manages the whole Network. An administrator creates usernames and
passwords for the user computers to Login. An administrator gives right to each user to
access to specific files. Users cannot see everything they want on the Network. They have
restricted rights on the Network. They can only access to the files that were shared by
everyone and the files that an Administrator gave him access. Administrator can control all
the network, and department heads have other controls of the each department areas depend
on the internet and file transferring authority area.
This only for the one detainment hardware and software specification.
Manufacture. Cabinet type: Dell
Operating System: Windows 8.1.
Processor. Manufacture: Intel
Type: Intel Core i3-3240
Speed: 3.4GHz
Bus Speed: 1000MHZ
Motherbo Form Factor: Micro-ATX.
Chipset: Intel B75 Chipset.
ard.
No of PCI Slots: 2
Peripheral Connectors USB2.0(2) , Speakers
Printers - 02
Leasing Department Cabins - 02
Computers - 10
Photocopy machine - 02
Sever Room Cabins - 01
Computer - 01
Printer - 01
Task: 08
10.1 Feedbacks
Emp. No 1529.
ID 751345673546V.
Name S. David.
Emp. No 2098.
ID 882344345634V.
Designation Cashier.
Emp. No 5045
ID 7256553445V
Sharing and transferring files within networks are very rapid. Thus
saving time, while maintain the integrity of the file.
Name J. Srihari
Emp. No 2078
ID 1991
Designation Receptionist
Additional Notes/ Suggestions you think, that could improve our services and care
towards you:
Thank you for your precious time, please you can have all the facilities at “ Flexi Lease
Finance (Pvt.) Ltd” company.
Task: 09
9.1 Test Results
Windows Server 2008 R2 is a network operating Microsoft, and can be deployed in medium
to large scale industries like Flexi Lease Finance (Pvt.) in order to allow administrators to
centrally manage the entire network setup right form the single location. Because it is the
huge company that’s why networking setup should implement for each and every uses.
8. On the Please read the License terms page, check I accept the license terms checkbox
and click next.
10. On where do you want to install Windows page, ensure that the hard drive on which
Windows Server 2008 R2 is to be installed is selected.
11. Once selected, click Drive options (advanced).
12. From the enabled options, click New to create a new disk drive partition.
13. On the size field, specify the size of the new volume in MB.
14. On the Installing Windows page, wait till the Windows Server 2008 R2 installed and
the computer get restarted.
15. Don not press any key if the screen displays the message, “Press any key to boot from
CD or DVD” while computer restarts for the first time, to resume the installation
process.
16. After second restart, on the displayed screen, click ok to change the user password
before logging on for the first time.
17. On the available fields, type and retype the new password and press enter.
2. Navigate to the Server Roles tab and press on the “Add Roles” button.
5. The Active Directory Domain Service requires adding feature to the server. Click on
“Add required features” on the appearing screen and then click on next.
7. At this point the Activate Directory Domain Services are not configured yet.
9. We are about to start the Active Directory Domain Services installation Wizard.
flexi.Lease.com
13. If the Domain Controller is a stand-alone server we don’t have to choose the DNS
server option. If otherwise, it’s recommended to leave it checked.
Figure 40(DNS)
Figure 41(Configure)
Figure 42(END)
But now a days firewalls are integrated with the routers. If we implement department firewall
intended for the organization, it can monitor network traffic for a certain number of
computers. It can offer some reporting on the type of information that the employees tried to
access or on incoming threats.
Now let’s discus about the advantages of the Flexi Lease Finance (Pvt.) Ltd company.
Bandwidth: Fiber optic cables have a much greater bandwidth than other cables especially
metal cables. The amount of information that can be transmission media is its most
significant advantage.
Low Power Loss: Optic fiber offers low power loss. This allows for longer transmission
distances.
Security: This optical fibers are difficult to tap. As they do not radiate electromagnetic
energy, emissions cannot be intercepted. Fiber is the most secure medium available for
carrying sensitive data.
Cost: The cost for fiber cable, components, and hardware has steadily decreased. Overall.
Fiber cable is more expensive than copper cable in the short run, but it may be less expensive
in the lone run.
Anti –Virus Anti –Virus Anti –Virus Anti –Virus Anti –Virus Anti –Virus Anti –Virus
updates Every 4 hours updates Every 4 hours updates Every 4 hours updates Every 4 hours updates Every 4 hours updates Every 4 hours updates Every 4 hours
Quick spyware Quick spyware Quick spyware Quick spyware Quick spyware Quick spyware Quick spyware
scan and removal scan and removal scan and removal scan and removal scan and removal scan and removal scan and removal
S.M.A.R.T S.M.A.R.T
Monitoring check. Monitoring check.
Review system logs for errors and potential problems. Twice a week
Review system backup process and disaster recovery status. Twice a week
Update emergency repair disks.
Test backup media.
Configure data set that is being backed up.