Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 83

NETWORKING TECHNOLOGY

Velusamy Dharshika
NETWORKING TECHNOLOGY

Contents
List of Figures...........................................................................................................................3
List of Tables............................................................................................................................5
Task: 01.....................................................................................................................................6
1.1 Networking.......................................................................................................................6

1.1 What is a network?.......................................................................................................6

1.2 Types of Networks........................................................................................................6

1.3 Network Topology..........................................................................................................11

1.3.1 Wired Network........................................................................................................11

1.3.2 Topologies...............................................................................................................12

Task: 02...................................................................................................................................22
2.1 Network standards..........................................................................................................22

2.1.1 What is the Network Standards...............................................................................22

2.1.2 Importance of Standard............................................................................................22

2.1.3 International Organization for Standardization (ISO).............................................23

2.1.4 American National Standards..................................................................................23

2.1.5 Institute of Electrical and Electronic Engineers (IEEE)..........................................23

2.1.6 Electrical Industries Alliance...................................................................................23

2.1.7 WAN Methods Standards........................................................................................23

2.1.8 Ethernet....................................................................................................................25

2.1.9 WAP.........................................................................................................................25

2.1.10 Bluetooth Technology............................................................................................26

2.1.11 WIMAX.................................................................................................................27

2.1.12 Wi–Fi.....................................................................................................................28

Task: 03...................................................................................................................................30
3.1 Importance of different protocols in data communication.............................................30

3.2 Roles of different protocols............................................................................................31

VELUSAMY DHARSHIKA Page 1 of 84


NETWORKING TECHNOLOGY

3.2.1 OSI Reference Model..............................................................................................31

Task: 04...................................................................................................................................37
4.1 Design a Network for Flexi Lease Finance (Pvt.)..........................................................37

4.2 Setup the Network..........................................................................................................39

4.3 Configure the Network...................................................................................................40

Task – 05.................................................................................................................................41
5.1 Role of Software and Hardware Components................................................................41

5.1 Hubs............................................................................................................................41

5.2 Routers........................................................................................................................42

5.3 Switch.........................................................................................................................43

5.4 Gateways.....................................................................................................................43

5.5 Solution of the Flexi Lease Finance (Pvt.).................................................................44

Task: 06..................................................................................................................................46
6.1 Servers............................................................................................................................46

6.1.1 Types of Servers......................................................................................................46

Task: 07...................................................................................................................................50
Task: 08...................................................................................................................................55
10.1 Feedbacks.....................................................................................................................55

Task: 09...................................................................................................................................58
9.1 Test Results....................................................................................................................58

9.1.1 System Requirements..............................................................................................58

9.1.2 Install Windows Server 2008...................................................................................58

9.1.3 Configure the Domain Controller............................................................................63

Task: 10...................................................................................................................................71
10.1 Security, Bandwidth, Quality.......................................................................................71

10.1.1 Increase the firewall protection..............................................................................71

10.1.2 Change into Fiber optic cable................................................................................71

Task – 11.................................................................................................................................73

VELUSAMY DHARSHIKA Page 2 of 84


NETWORKING TECHNOLOGY

11.1 Maintain Schedule for Week (Flexi Lease Finance (Pvt.) Ltd.....................................73

11.2 Server Maintains...........................................................................................................74

11.3 Network Maintenance..................................................................................................75

11.4 Workstation Maintenance.............................................................................................75

Appendix - A...........................................................................................................................76
References...............................................................................................................................77

VELUSAMY DHARSHIKA Page 3 of 84


NETWORKING TECHNOLOGY

List of Figures
Figure 1(Network)......................................................................................................................6
Figure 2(LAN)...........................................................................................................................7
Figure 3(MAN)..........................................................................................................................8
Figure 4(WAN)..........................................................................................................................9
Figure 5(Bus)...........................................................................................................................13
Figure 6(Mesh).........................................................................................................................15
Figure 7(Star)...........................................................................................................................16
Figure 8(Tree)..........................................................................................................................17
Figure 9(Network Standards)...................................................................................................22
Figure 10(WIMAX).................................................................................................................27
Figure 11(Network Infrastructure)...........................................................................................37
Figure 12(Devices)...................................................................................................................41
Figure 13(Hub).........................................................................................................................42
Figure 14(Routers)...................................................................................................................42
Figure 15(Switch).....................................................................................................................43
Figure 16(Loan Department)....................................................................................................52
Figure 17(Saving Department).................................................................................................53
Figure 18(Pawning Department)..............................................................................................54
Figure 19(Leasing Department)...............................................................................................54
Figure 20(Install Windows).....................................................................................................59
Figure 21(Operating System)...................................................................................................59
Figure 22(License Terms)........................................................................................................60
Figure 23(custom (advanced)).................................................................................................60
Figure 24(Drive Options).........................................................................................................61
Figure 25(Disk Drive Partition)...............................................................................................61
Figure 26(Installing Windows)................................................................................................62
Figure 27(Login Form)............................................................................................................62
Figure 28(IP address)...............................................................................................................63
Figure 29(Server Manager)......................................................................................................64
Figure 30(Add Roles Wizard)..................................................................................................64
Figure 31(Active Directory Domain Services)........................................................................65
Figure 32(Add Roles Wizard)..................................................................................................65

VELUSAMY DHARSHIKA Page 4 of 84


NETWORKING TECHNOLOGY

Figure 33(Installation Progress)...............................................................................................66


Figure 34(Activate Directory Domain Services).....................................................................66
Figure 35(Activate Directory Domain Services).....................................................................67
Figure 36(Installation Wizard).................................................................................................67
Figure 37(Installation Wizard).................................................................................................68
Figure 38(Domain name).........................................................................................................68
Figure 39(Functional Level)....................................................................................................69
Figure 40(DNS)........................................................................................................................69
Figure 41(Configure)...............................................................................................................70
Figure 42(END).......................................................................................................................70
Figure 43(Fiber Optic).............................................................................................................71

VELUSAMY DHARSHIKA Page 5 of 84


NETWORKING TECHNOLOGY

List of Tables
Table 1(Feedback – Department Head)...................................................................................56
Table 2(Feedback - Employee)................................................................................................56
Table 3(Feedback – Department Head)...................................................................................57
Table 4(Feedback - Employee)................................................................................................57

VELUSAMY DHARSHIKA Page 6 of 84


NETWORKING TECHNOLOGY

Task: 01
1.1 Networking
1.1 What is a network?
The interconnection of two or more computers and hardware devices by physical and logical
means with the help of hardware devices and software is called networking.

A network consists of two or more computers that are linked in order to share resources (such
as printers and CD-ROMs), exchange files, or allow electronic communication. The computer
on a network may be linked through cables, telephone lines, radio waves, satellites, or
infrared light beams.

Advantages of networking are used of interconnection and communication between system,


Used in data sharing, Multiplayer gaming. Disadvantages of networking are Installation costs
are high, Breaching of data is possible

Before applying the network types to the Flexi Lease Finance (Pvt.) Ltd, let me give you an
idea of the available type on networks.

Figure 1(Network)

1.2 Types of Networks


Usually networks are classified on the basics of their geographical coverage. On the basis
network is classified into three types.
1. Local Area Network (LAN).
2. Metropolitan Area Network (MAN).
3. Wide Area Network (WAN).

VELUSAMY DHARSHIKA Page 7 of 84


NETWORKING TECHNOLOGY

1.2.1 Local Area Network

 A Local Area Network (LAN) is a network that is confirmed to relatively small area ,
generally limited to geographic area such as writing lab, Scholl, building.

 Rarely are LAN computers more than a mile apart in a typical LAN configuration,
one computer is designed as the file server and stores all of the software that controls
the network.

 Computers connected to the file server are called workstations.

 The workstations can be less powerful than the file server and they may have
additional software on their hard drivers.

Figure 2(LAN)

1.2.1.1 Advantages of LAN


 Workstations can share peripheral devices like printers. This is cheaper than buying a
printer for every workstations.
 Workstations do not necessarily need their own hard disk or CD – ROM drivers
which make them cheaper to buy than the stand – alone PCs.
 User can save their work centrally on the networks file server. This means that they
can retrieve their work form any workstations on the network.
 They do not need go back to the same workstation all the time.
 User can communicate with each other and transfer data between workstations very
easily.
 One copy of each application package such as a word processors, spreadsheet etc. can
be loaded onto the file shared by all users.

VELUSAMY DHARSHIKA Page 8 of 84


NETWORKING TECHNOLOGY

 When a new version comes out, it only has to be loaded onto the server instead of
onto every workstations.
1.2.1.2 Disadvantages of LAN
 Special security measures are needed to stop users form using programs and data that
they should not have access to.
 Networks are difficult to set up and need to be maintain by skilled techniques.
 If the file sever develops a serious fault, all the users are affected, rather than just one
user in the case of stand – alone machine.

1.2.2 Metropolitan Area Network

 A Metropolitan Area Network (MAN) covers larger area, such as cities or school,
districts.

 By interconnecting smaller networks within a large geographic area information is


easily disseminated throughout the network.

 Local libraries and government agencies often use a MAN to connect to citizens and
private industries.

 One example of a MAN if the MIND network located in Pasco country, Florida. It
connects all of Pasco’s media centers to centralized mainframe at the district office by
using dedicated phone lines, coaxial, and wireless compunctions providers.

Figure 3(MAN)

VELUSAMY DHARSHIKA Page 9 of 84


NETWORKING TECHNOLOGY

1.2.2.1 Advantages of MAN


 The biggest advantage of MANs is the bandwidth (potential speed) of the connecting
links. The resources (such as databases and files) shared on the network can be
accessed extremely quickly.
 Some installations allow multiple users to share the same high- speed internet
connection, thereby sharing the cost of the service and securing a better quality of
service through collective bargaining and economics of scale.
 We can use MAN within a cities and it seems much faster.

1.2.2.2 Disadvantages of MAN


 The key disadvantage of MANs is the cost of the cutting – edge technology
employed.
 The equipment generally has to be installed for the first time, as the copper
traditionally used for the phone network is generally considered to be too slow to be
annexed for this purpose.
 While we move our network to another city it doesn’t work.

1.2.3 Wide Area Network

 Wide Area Network (WAN) connect larger geographic areas, such Florida, the United
Sates, or the world.

 Satellite uplinks may be used to connect this type of network.

 Using WAN schools in Florida can communicate with paces like Tokyo in a matter of
minutes, without paying enormous phone bills.

 It uses multiplexers to connect local and metropolitan networks to global


communications networks like the internet.

VELUSAMY DHARSHIKA Page 10 of 84


NETWORKING TECHNOLOGY

Figure 4(WAN)

1.2.3.1 Advantages of WAN


 Message cab be sent very quickly to anyone else on the network. These messages can
have pictures, sounds or data included with them (called attachments).
 Expensive things (such as printers or phone lines to the internet) can be shared by all
the computers on the network without having to buy a different peripheral for each
computer.
 Everyone on the network can use the same data. This avoids problems where some
users may have older information than others.
 Share information/ files over a large area.

1.2.3.2 Disadvantages of WAN


 Setting up a network can be expensive and complicated experience. The bigger the
network the more expensive it is.
 Security is a real issue when many different people have the ability to use information
from other computers. Protection against hackers and viruses adds more complexity
and expense.
 Once set up, maintaining a network is a full – time job which requires network
supervisors and technicians to be employed.
 Information may not meet local needs or interests.

I would like to recommend LAN network to Flexi Lease Finance (Pvt.) Ltd. Because the
relatively small area and limited to geographic area. This is the main reason to chosen this
type of the network. Here I have given some of other reasons as well.
 A local area network is a network that is confined to. It is generally limited to a
geographic.

VELUSAMY DHARSHIKA Page 11 of 84


NETWORKING TECHNOLOGY

 LANs are reliable, high speed communication and low cost.


 Do not required the national telephone companies to provide communication links.
 Resources sharing capability allows storage space and network peripherals, such as
printers, to be shared by file server, reducing hardware requirement, expenses and
improving productively.
 Standard PC hardware is used for network servers, which provide a great deal of
design flexibility, easy maintenance and cost efficiency.
 Communication to other users is also provide through a messaging system. It is the
basis for implementing sophisticated systems.
 Through file sharing, users can easily transfer files to on one another, in order to
improve productivity. Shared files access allow multi-user access to user applications.
 LANs offer centralized security, which aloe control over access to the network and its
resources.
 With centralized data storage, LANs offer the ability to place shared data on a single
server within a central location. Network backups are easier and more reliable
because all data resides on one physical location.

1.3 Network Topology


Organizations rely heavily on the ability to share information throughout organization in an
efficient and productive manner. Computer networks have allowed for this technology and
are now a part of almost every business. An organization has two options when it comes to
setting up a network. They can use a completely wired network which uses networking cable
to connect computers, or they can use a network, which uses radio frequencies to connect
computer. Wireless network have allowed organizations to become more mobile; therefore,
organizations are now using a combination of both wired and wireless networks.

As technology advances in society the need for wired and wireless networking has become
essential. Each of these types of networking has their advantages and disadvantages
according to security. Wired networking has different hardware requirement and the range
and benefits are different. Wireless networking takes into consideration the range, mobility,
and the several types of hardware components needed to establish a wireless network.

VELUSAMY DHARSHIKA Page 12 of 84


NETWORKING TECHNOLOGY

1.3.1 Wired Network

 Wired networks, also called Ethernet networks, are the most common type of local
area network (LAN) technology.

 A wired network is simply a collection of two or computers, printers and other


devices linked by Ethernet cables.

 Ethernet is the fastest wired network protocol, with connections speed of 10 megabits
per second (Mbps) to 100 Mbps or higher.

 Wired networks can also be used as part of other wired and wireless networks.

 To connect a computer to a network with the Ethernet cable, the computer must have
an Ethernet adapter (sometimes called a network interface card or NIC).

 Ethernet adapters can be internal (install in a computer) or external. Some computers


include a build – in Ethernet adapters’ port, which elements the need for a separate
adapters (Microsoft).

 There are in network topologies that are most commonly used today.

1.3.2 Topologies
Network topology describe the ways in which the elements of a network mapped. They
describe the physical and logical arrangement of the network nodes
The types of topologies are;

 Physical Topology: the physical topology of a network refers to the configuration


cables, computers and other application.

 Logical Topology: Physical topology should not be confused with logical topology
which is the method used to pass information between workstation.

Let’s discuss physical topologies in the network.


1.3.2.1 Bus Topology

 A linear bus topology consists of a main run of cable with a terminator at each end.

 All the nodes (file, server, workstations, and peripherals) on bus topology are
connected by one signal cable.

VELUSAMY DHARSHIKA Page 13 of 84


NETWORKING TECHNOLOGY

 A bus topology consists of a main run of cable with a terminator at each end. All
nodes (file, server, workstations, and peripherals) are connected to the linear cable.

 Popular on LANs because they are inexpensive and easy to install.

 Ethernet and Local Talk networks use a linear bus topology.

Figure 5(Bus)

1.3.2.1.1 Advantages of Bus Topology


 Easy to connect a computer or peripheral to a linear bus.
 Requires less cable length than the star topology.
 It easy to set up, handle, and implement.
 It is best suitable for small networks.
 It costs very less.

1.3.2.1.2 Disadvantages of Bus Topology


 The cable length is limited. This limits the number of network nodes that can be
connected.
 This network topology can perform well only for a limited number of nodes. When
the number of devices connected to the bus increases, the efficiency decreases.
 It is suitable for networks with low traffic. High traffic increases load on the bus and
the network efficiency drops.
 It is heavily dependent on the central bus. A fault in the bus leads to network failure.
 It is not easy to isolate faults in the network nodes.

VELUSAMY DHARSHIKA Page 14 of 84


NETWORKING TECHNOLOGY

 Each devices on the network “sees” all the data being transmitted, thus posing a
security risk.

1.3.2.2 Ring Topology


 In a ring topology, every device has exactly two neighbors for communication
purposes.

 All messages travel through a ring in the same direction.

 A failure in any cable or device breaks the loop and can take down the entire network.

 To implement a ring network we use the Token Ring technology.

 A token or small data packet, is continually passed around the network. When a
device needs to transmit, it reserves the token for the next trip around, then attaches
its data packet to it.

1.3.2.2.1 Advantages Ring Topology


 The data being transmitted between two nodes passes through all the intermediate
nodes. A central server is not required for the management of this topology.
 The traffic is unidirectional and the data transmission is high – speed.
 In comparison to a bus, a ring is better at handling load.
 The adding or removing of network nodes is easy, as the process requires changing
only two connections.
 The configuration makes it easy to identify faults in network nodes.
 It is less costly than a star topology.

1.3.2.2.2 Disadvantage Ring Topology


 The failure of a signal node in the network can cause the entire network to fall.
 The movement or changes made to network nodes affect the entire networks
performance.

VELUSAMY DHARSHIKA Page 15 of 84


NETWORKING TECHNOLOGY

 Data sent form one node to another has to pass through all the intermediate nodes.
This makes the transmission slower in comparison to that in a star topology. The
transmission speed drops with an increase in the number of nodes.
 There is heavy dependency on the wire connecting the network nodes in the ring.

1.3.2.3 Mesh Topology


 In this topology, each node is connected to every other node in the network.

 Implementing the mesh topology is expensive and difficult.

 In this type of network, each node may send message to destination through multiple
paths.

 While the data is travelling on the Mesh Network it is automatically configured to


reach the destination by taking the shortest route which means the least number of
hops.

Figure 6(Mesh)

Advantages of Mesh Topology


 The arrangement of the network nodes is such that it is possible to transmit data from
one node to many other nodes at the same time.
 The failure of a single node does not cause the entire network to fail as there are
alternate paths for data transmission.
 It can handle heavy traffic, as there are dedicated paths between any two network
nodes.
 Point – to – point contact between every pair of nodes, makes it easy to identify faults.

VELUSAMY DHARSHIKA Page 16 of 84


NETWORKING TECHNOLOGY

Disadvantages of Mesh Topology

 The arrangement where in every network node of connected to every other node of
the network, many connections serve no major purpose. This leads to redundancy of
many network connections.

 A lot of cabling is required. Thus, the costs incurred in setup and maintenance are
high.

 Owing to its complexity, the administration of a mesh network is difficult.

Star topology
 The star network, a general more simplistic type of topology, has one central hub that
connects to three or more computers and the ability to network printers.

 This type can be used for small business and even home networks.

 The star network is very useful for applications where some processing must be
centralized and must be performed locally.

 The major disadvantage of the star network is all data must pass through one central
host computer and if that host fails the entire network will fail.

Figure 7(Star)

Advantages of Star Topology

 Due to its centralized nature, the topology offers simplicity of operation.

 It also achieves isolation of each device in the network.

VELUSAMY DHARSHIKA Page 17 of 84


NETWORKING TECHNOLOGY

 Adding or removing network nodes is easy, and can be done without affecting the
entire network.

 Due to the centralized nature it is easy to detect faults in the network devices.

 As the analysis of traffic is easy, the topology poses lesser security risk.

 Data packets do not have to pass through many nodes, like in the case of a ring
network. Thus, with the use of a high capacity central hub, traffic load can be handled
at fairly decent speeds.

Disadvantages of Star Topology


 Network operation depends on the functioning of the central hub. Hence, central hub
failure leads to failure of the entire network.
 Also, the number of nodes that can be added, depends on the capacity of the central
hub.
 The setup costs is quite high.
 Requires more cable length than a linear topology.

Figure 8(Tree)

Tree topology
 A tree topology (hierarchical topology) can be viewed as a collection of star networks
arranged in hierarchy.

VELUSAMY DHARSHIKA Page 18 of 84


NETWORKING TECHNOLOGY

 This tree has individual peripheral nodes which are required to transmit to and receive
from one other only and are not required to act as repeaters or regenerators.

 The tree topology arranges links and nodes into distinct hierarchies in order to allow
greater control and easier troubleshooting.

 This is particularly helpful for colleges, universities and school so that each of the
connection to the big network in some way.

Advantages of Tree Topology


 The tree topology is useful in cases where a star bus cannot be implemented
individually.
 The advantage of centralization that are achieved in a star topology are inherited by
the individual star segment in a tree network.
 Fault identification in easy.
 The network can be expanded by the addition of secondary nodes. Thus, scalability is
achieved.

Disadvantages of Tree Topology


 As multiple segment are connected to a central bus, the network depends heavily on
the bus. Its failure affects the entire network.
 Owing to its size and complexity, maintenance is not easy and costs are high, also,
configuration is difficult in comparison to that in other topologies.
 Though it is scalable, the number of nodes that can be added depends on the capacity
of the central bus and on the cable type.

Now let’s discuss Logical Topologies of the network.

Ethernet

 The Ethernet protocol is by far the most widely used.

 Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access /
Collision Detection).

VELUSAMY DHARSHIKA Page 19 of 84


NETWORKING TECHNOLOGY

 This is a system each computer listens to the cable before sending anything through
the network.

 If the network is clear, the computer will transmit. If some other node is already
transmitting on the cable, the computer will wait and try again when the line is clear.

 The Ethernet protocol allows for liner bus, star, or tree topologies. Data can be
transmitted over twisted pair, coaxial or fiber optic cable at a speed of 10 mbps up to
1000 Mbps.

Local Talk

 Local Talk is a network protocol that was developed by Apple Computer, for
mackintosh computers.

 The method used by LocalTalk is called CSMA/CA (Carrier Sense Multiple Access /
Collision Avoidance).

 It is similar to CSMA/CD except that a computer signals its intent to transmit before it
actually does so.

 The Macintosh operating system allows the establishment of peer to peer network
without the need for additional software. With the addition of the server version of
AppleShare software, a client/ server can be established.

 The Local Talk protocol allows for liner bus, star or tree topologies using twisted pair
cable.

 Its speed of transmission is only 230 kbps.

ATM
 Asynchronous Transfer Mode (ATM) is a network protocol that transmit data at a
speed of 155 Mbps and higher.

 ATM works by transmitting all data in small packets of a fixed size, whereas, other
protocols transfer variable length packets.

 ATM supports a variety of media such as video, CD – Quality audio, and imaging.

VELUSAMY DHARSHIKA Page 20 of 84


NETWORKING TECHNOLOGY

 ATM employs a star topology, which can work with fiber optic as well as twisted pair
cable.

 ATM is most often used to interconnection two or more local area networks.

 It is also frequently used by Internet Service Providers to utilize high speed access to
the internet for their clients.

VELUSAMY DHARSHIKA Page 21 of 84


NETWORKING TECHNOLOGY

Now let’s discuss which topology is suitable for the Flexi Lease Finance (Pvt.) Ltd Company
and why it has chosen for this Flexi Lease Finance (Pvt.) Ltd Company and why other
topologies did not chosen for this company.

I would like to recommend star topology to Flexi Lease Finance (Pvt.) Ltd Company.
Already we have discussed above section but here there are given some of extra details about
this topology and there are given some reason to choose of this topology.

Star Topology
The reasons why star topology model was selected

 Easy to install and wire.

 No distribution to the network than connecting or removing devices.

 Easy to detect faults and remove parts.

 Due to its centralized nature, the topology offers simplicity of operation.

 It also achieves isolation of each device in the network.

 Data packets do not have to pass through many nodes, like in the case of a ring
network. Thus, with the use of a high capacity central hub, traffic load can be handled
at fairly decent speeds.

The main reason to select to Flexi Lease Finance (Pvt.) Ltd Company is, it has 2 floors and
there are in different types of departments. Definitely it should have the communication each
and every departments. Each departments can easy way to communicate and easy to install
and wire. If some time it gets any problems easy to detect faults and or remove the parts
without affecting the other devices on the network. This really flexibly for them.

There is another very big advantage on this topology that is if the data packets are sent
quickly as they do not have to travel through any unnecessary nodes. Here the Flexi Lease
Finance (Pvt.) Ltd Company can have some different types of procedure to maintain the files
and documentations at the point they should to need quick responses, that’s why this could be

VELUSAMY DHARSHIKA Page 22 of 84


NETWORKING TECHNOLOGY

suitable topology for them. It performance is greater with speeds capable of 10mbps to
100mbps or more.
Let us describe why we DID NOT choose other available topologies.

Linear Bus Topology

 Entire network shuts down if there is a break down in the main cable.

 Terminators are required at both ends of the backbone cable.

 Difficult to identify the problem if the entire network shuts down.

 Not meant to be used as a stand – alone solution in a large building.

Tree Topology

 Overall length of each segment is limited by the type of cabining used.

 If the backbone line breaks, the entire segment goes down.

 More difficult to configure and wire than other topologies.

Mesh Topology

 The arrangement where in every network node of connected to every other node of
the network, many connections serve no major purpose. This leads to redundancy of
many network connections.

 A lot of cabling is required. Thus, the costs incurred in setup and maintenance are
high.

 Owing to its complexity, the administration of a mesh network is difficult.

VELUSAMY DHARSHIKA Page 23 of 84


NETWORKING TECHNOLOGY

Task: 02
2.1 Network standards
Before we go the task we should analysis all over the network standards and technologies.
2.1.1 What is the Network Standards
 Network standards are rules that govern the exchange of messages between hardware
or software process on different hosts, including messages (ordering, semantics, and
syntax), reliability, and connection oriented.
 These are some common standards in networking;
 International Organization for Standardization (ISO).
 International Telecommunication Union (ITU).
 Institute Electrical and Electronics Engineers (IEEE).
 Electronic Industries Alliance / Telecommunications Industry Association
(EIA / TIA).
 Communications Information Technology Association (CITA).
 European Telecommunications Standards Institute (ETSI).

Figure 9(Network Standards)

2.1.2 Importance of Standard


 Vendors and some end users initially expected to dive head first into implementing
wireless network.

VELUSAMY DHARSHIKA Page 24 of 84


NETWORKING TECHNOLOGY

 Markets did not respond as predicted, and flat sales growth of wireless networking
components prevailed through most of the 1990s.
 Relatively low data rates, high prices, and especially the lack of standard kept many
end users form purchasing the wire –free forms of media.
2.1.3 International Organization for Standardization (ISO)
 ISO is a collection of standards organizations representing 130 countries.
 ISO’s goal is to establish international technological standards to facilitate global
exchange of information and barrier – free trade.

2.1.4 American National Standards


 ANSI is an organization composed of more than 1000 representatives from industry in
addition to other fields, such as chemical and nuclear engineering, health and safety,
and construction.
 ANSI also represents the United States in setting international standards.

2.1.5 Institute of Electrical and Electronic Engineers (IEEE)


 The IEEE is an international society composed of engineering professionals.
 Its goals are to promote development and education in the electrical engineering and
computer science field.

2.1.6 Electrical Industries Alliance


 EIA is trade organization composed of representatives from l electronics
manufacturing firms across the United States.
 EIA began as the Radio Manufacturing Association (RMA) in1924; over time it
evolved to include manufactures of televisions, computer and networking.

2.1.7 WAN Methods Standards


2.1.7.1 X.25
 This has defines how connections between user devices and network devices are
established and maintained.

 Implemented at the network layer (Layer 3) of the OSI / RM.

 Uses two types of virtual circuits;

VELUSAMY DHARSHIKA Page 25 of 84


NETWORKING TECHNOLOGY

 Switched virtual circuits (SVC) – a temporary connection used for sporadic


data transfers.

 Permanent virtual circuit (PVC) – a permanently established connection


used for frequent and consistent data transfers.
2.1.7.2 Fast Packet Switching
 Tasks such as error correction, packet sequencing and acknowledgment are not
performed by the network.

 Implemented at the MAC sublayer of the OSI/RM data link layer (Layer 2).

 Technologies include frame relay and asynchronous transfer mode (ATM)

2.1.7.3 Frame Relay


 A packet – switching technology used for WANs and LAN – to – LAN connections
that supports data and voice.

 Organizes data into variable – length packets called frames.

2.1.7.4 Asynchronous Transfer Mode (ATM)


 ATM works by transmitting all data in small packets of a fixed size, whereas, other
protocols transfer variable length packets.

 ATM employs a star topology, which can work with fiber optic as well as twisted pair
cable.

 ATM is most often used to interconnection two or more local area networks.

 It is also frequently used by Internet Service Providers to utilize high speed access to
the internet for their clients.

2.1.7.5 Peer – to – Peer Networking


 A networking model in which each computer has both client and server capabilities.

 P2P is a peer – to –peer network on the internet.

 P2P advantages:

VELUSAMY DHARSHIKA Page 26 of 84


NETWORKING TECHNOLOGY

 Cost – Because P2P networks are used on the internet, an existing, reliable
infrastructure is already in place.

 Reliability – Clients use their own network connections, creating a reliable


network.

 Load distribution – Clients download files from multiple locations, which


helps keep any one location form being overburdened.
2.1.7.6 Point – to – Point Protocol (PPP)
 A communications protocol that allows a computer to connect to the internet over a
phone line.

 Used to send and receive IP data packets using a modem.

 Enables TCP/IP to run on a layer link.

 Multilink Point – to – Point Protocol (MLPPP) – combines two PPP connections


into one, thereby enabling a higher transmission speed.

2.1.8 Ethernet

 The Ethernet protocol is by far the most widely used.

 Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access /
Collision Detection).

 This is a system each computer listens to the cable before sending anything through
the network.

 If the network is clear, the computer will transmit. If some other node is already
transmitting on the cable, the computer will wait and try again when the line is clear.

 The Ethernet protocol allows for liner bus, star, or tree topologies. Data can be
transmitted over twisted pair, coaxial or fiber optic cable at a speed of 10 mbps up to
1000 Mbps.

2.1.9 WAP
 WAP is published by the WAP forum, founded in1997 by Ericson, Motorola, Nokia,
and Unwired Planet.

VELUSAMY DHARSHIKA Page 27 of 84


NETWORKING TECHNOLOGY

 Forum members now represent over 90% of the global handset, software developers
and other organizations.
 The wireless Application Protocol is a standard, specifically a protocol that specifies,
how some mobile devices such as smart phones can display the content of internet
services such as the web, email, and chat rooms.
 WAP is the set of rules governing the transmission and reception of data by computer
application on or via wireless devices like mobile phones.
 WAP allows wireless devices to view specifically designed pages form the internet
using only plain text and very simple black and white pictures.
2.1.10 Bluetooth Technology
 Bluetooth technology is leading the future of wireless connections between different
technological devices.
 Bluetooth is built into a variety of different devices including; phones, headsets, and
even medical equipment.
 It lets you make calls, listen to music, and send all kinds of information wirelessly,
without and cable connection.
 Data exchange without wires is the staple of Bluetooth technology.
 Its only limitation is that can be used effectively over a maximum distance of 100
meters.
 It can also be used to connect to LAN networks (Local Area Network).

2.1.10.1 How does it work?


 Bluetooth is a standard for tiny, radio frequency chips that can be plugged into
the devices.

 These chips were designed to take all of the information that the wires
normally send, and transmit it at a special frequency to something called a
receiver Bluetooth chip.

 The information is then transmitted to the device.

2.1.10.2 Advantages of Bluetooth


 It is cheap

 Easy to install.

VELUSAMY DHARSHIKA Page 28 of 84


NETWORKING TECHNOLOGY

 It makes connecting to different devices convenient.

 It is wireless.

 It is free to use if the devices is installed with it.

2.1.10.3 Disadvantages of the Bluetooth.


 It can be hacked.

 If installed on a cellphone it is prone to receiving cell phone viruses.

 It only allows short range communication between devices.

 It can lose connection in certain condition.

 It can only connect two devices at once.

2.1.11 WIMAX
 WIMAX stands for Worldwide Interoperability for Microwave Access.
 WiMAX refers to broadband wireless networks that are based on the IEEE 802.16
standard, which ensures compatibility and interoperability between broadband
wireless access equipment.
 It combines the familiarity of Wi-Fi with the mobility of cellular that will deliver
personal mobile broadband that moves with you.

2.1.11.1 How does is work


 A WIMAX tower station can connect directly to the internet using a high –
bandwidth, wired connection.

 It can also connect to another WIMAX tower using a line-of-sight, microwave


link.

 This connection to a second tower to cover up to 3000 square miles, is what


allows WIMAX to provide coverage to remote rural areas.

VELUSAMY DHARSHIKA Page 29 of 84


NETWORKING TECHNOLOGY

Figure 10(WIMAX)

2.1.11.2 Advantages of WIMAX

 Single station can serve hundreds of user.

 Much faster deployment of new users comparing to wired networks.

 Speed of 10Mbps at 10 km with line-of-site.

 It is standardized, and same frequency equipment should work together.

2.1.11.3 Disadvantages of WIMAX

 Line of site is needed for longer connections.

 Weather conditions like rain could interrupt the signal.

 Other wireless equipment could cause interference.

 WiMAX is very power intensive technology and requires strong electrical


support.

 Bid installation and operation coast.

 Common misconception is that the WiMAX can offer 70 Mbps in range of 70


miles (113km) with moving stations.

VELUSAMY DHARSHIKA Page 30 of 84


NETWORKING TECHNOLOGY

2.1.12 Wi–Fi
 Wi-Fi (Wireless Fidelity) is the technology that allows to connect the internet at fast
speeds without using wires.
 It also allows users to create their own LAN (Local Area Network) and conduct
wireless data transmission between different network elements.
 The first wireless LANs came into being in 1994 but it was very expensive and this
blocked its development.
 In 1997 IEEE (the institute of Electrical and Electronic Engineers) worked out the
802.11 standard. However people forgot about it very soon because of low capacity.
 In 1999 IEEE introduced the 802.11b standard which brought higher capacities.
 Wi-Fi uses unlicensed radio spectrum and does not require regulatory approval for
individual deplores.
 It allows local area networks (LANs) to be setup with cabling.
 The can reduce associated costs of network connection and expansions.

2.1.12.1 How a Wi-Fi Network works


 A Wi-Fi hotspot is created by installing an access point to an internet
connection.

 An access point acts as a base station.

 When Wi-Fi enabled device encounters a hotspot the device can then connect
to that network wirelessly.

 A single access point can support up to 30 users and can function within a
range of 100-150 feet indoors and up to 300 feet outdoors.

 Many access points can be connected to each other via Ethernet cables to
create a single large network.

Now let’s start to choose the proper network technology to Flexi Lease Finance (Pvt.) Ltd. I
would like to recommend Wi-Fi technology is the suitable for this company.

The reason why I have chosen this technology is very first reason is easy of communication.
Wi-Fi allows users to stay connected all of the time. In this business is able to maintain a
consistent flow of communication in the different types of departments at Flexi Lease

VELUSAMY DHARSHIKA Page 31 of 84


NETWORKING TECHNOLOGY

Finance (Pvt.) Ltd. In this organization should have the communication each and every
employees as well as available departments. This factor is increased productivity, allowing
employees to collaborative where and when need to them. It brings freedom of operation and
speeds up the working process.

Another factor is cost. Cost is the main power of the company. Using wireless technology
rather than having a hard wired network can be much more cost – effective. The larger the
network company, both in terms of area and users, the more expensive a hard wired network
will be to install. It is not just the amount of cabling, but the actual cost of the labour to
install, and chase the cabling all through the premises; through walls, up and down different
floors. This Wi-Fi allows to quickly install the technology anywhere in their facility build a
secure that can support of their employees. Wi–Fi is easy to expand and can take on
additional users with existing equipment, unlike wired cables which require additional wiring
and installation. These are the main reasons to chosen this technology to Flexi Lease Finance
(Pvt.) Ltd.

Task: 03
3.1 Importance of different protocols in data communication
Communication protocols are basically all of the communications between the devices,
protocols in general are a pre-defined sets of rules which are used to split data up in order for
it to be sent in a particular way.
The following reasons are why communication protocols are important.
 Private communication capabilities.
 Authentication messages.
 Error checking.
 Breaking up data into blocks, also known as “packets”

Listed above this are some of the main functions for some of the protocols in the TCP/IP
suite. There is also some extra importance what communication protocols bring, without all
of the things listed below there would be no organized, or any secure types of communication
occurring between any computers in the network, or even the internet.

VELUSAMY DHARSHIKA Page 32 of 84


NETWORKING TECHNOLOGY

Many of the protocols included inside the TCP/IP suite control how the computers send
messages, how to handshake, and this also includes repairing broken and incomplete
messages. Listed below are some of the main functions of communication protocols, and
what makes them important
 Detection of the network connection, it can be wireless or wired;
 Handshaking.
 How to for format communication messages.
 How to send and receive messages.
 Handle various connections.
 Correction of broken and incomplete messages.
 Termination of the session, or connection.

All of the above manage and tell the computers how to send and receive data, without this
there would be not communication between the computers at all. This is all one through
protocols, these are the pre-define rules set, to let the computers communication in an
unformed way. If these did not exist, then the computer system would not be able to run in a
network, or do any forms of communication in a networked level. Also, the protocols prevent
errors occurring, and if they do then they can also be prepared, which prevents the same data
being sent again, and again using up bandwidth when it isn’t needed.

3.2 Roles of different protocols


3.2.1 OSI Reference Model
 It was developed in 1984 by international Organization for Standardization (ISO).
This model have following seven layers.
 The main idea in OSI is that the process of communication between two end points in
a telecommunication network can be divided into layers, with each layer adding its
own set of special, related function.
 OSI divides telecommunication into seven layers.
 The layers are in two groups.
 The upper four layers are used whenever a message passes to the user. The lower
three layers up to the network layer are used when any message passes through the
host computer.

VELUSAMY DHARSHIKA Page 33 of 84


NETWORKING TECHNOLOGY

 Messages destined for some other host are not passed up to the upper layers but are
forwarded to another host.
 The seven layers in OSI are described below.

3.2.1.1 Application Layer


 Application layer provides platform to send and receive data over the network.

 All application and utilities that communication with network fall in this layer.

 For Example;

 Browsers: Mozilla Firefox, Internet Explorer, Google Chrome etc.


 Email clients: Outlook express, Mozilla Thunderbird etc.
 FTP Clients: FileZilla, FTP.

 Here there are some application layer protocol;

 SNMP (Simple Network Management Protocol) – Allow control of


networked devices.
 TFTP (Trivial File Transfer Protocol) – Simple light weight file transfer.
 DNS – (Domain Naming System) – Translate a website name (easy for
people) to an IP address (easy for computer).
 DHCP (Dynamic Host Configuration Protocol) – Assigns IP, mask, and DNS
server (plus a bunch of other stuff) to hots.
 Telnet – Provides a remote terminal connection to manage devices, which
you are not close enough to use a console cable.
 HTTP (Hyper Text Transfer Protocol) – Browser web page.
 FTP (File Transfer Protocol) – Reliability sends / retrieves all a file types.
 SMTP (Simple Mail Transfer Protocol) – Sends email.
 POP3 (Post Office Protocol v.3) – Retrieves email.
 NTP (Network Time Protocol) – Synchronizes networked device clock.

3.2.1.2 Presentation Layer


 Presentation layer prepares the data.

 It takes data from application layer and mark it with formatting code such as. Doc,
jpg, txt etc.

VELUSAMY DHARSHIKA Page 34 of 84


NETWORKING TECHNOLOGY

 These file extension make it easy to realize the particular file is formatted with
particular type of application.

 With formatting presentation layer also deals with compress and encapsulation. It
compress or decompress the data file.

 This layer can also encapsulate the data, but it’s uncommon as this can be handle by
lower layers more effectively.

3.2.1.3 Session Layer


 Session layer deals with connections.

 It establishes, manages, and terminates session between two communicating node.

 This layer provides its services to presentation layer.

 Session layer also synchronizes dialogue between the presentation layers of the two
hosts and manages their data exchange.

 For example, web servers may have many users communicating with server at a given
time. Therefore, keeping track of which user communication on which path is
important and session layer handle this responsible accurately.

3.2.1.4 Transport Layer


 It sets up and maintain the connection between two layers.

 It multiplexes connections that allow multiple applications to simultaneously send and


receive data.

 According to requirement data transmit method can be connection oriented or


connection less.

 For unreliable data delivery connection less method is used.

 Connection less methods use UDP protocol.

 For reliable data delivery connection oriented method is used.

 Connection oriented methods use TCP protocol.

VELUSAMY DHARSHIKA Page 35 of 84


NETWORKING TECHNOLOGY

 When implemented a reliable connection, sequence numbers and acknowledgements


are used.

 In this layer has some main five functions, that are;

 Segment,
 Connection management
 Reliable and unreliable data delivery.
 Flow control.
 Connection multiplexing.

3.2.1.5 Network Layer


 Network layer is responsible for providing logical address know as IP address.

 Router works on this layer.

 The main functions of this layer are following;

 Define IP address.
 Find routes based on IP address to reach its destination.
 Connect different data link type together like as Token Ring, FDDI, Ethernet
etc.

3.2.1.6 Data Link Layer


 The data link layer sends frames from the network layer to the physical layer.

 It is responsible for the control of the signals that enter and leave the network cable.

 On the receiving end, the data link layer packages raw bits from the physical layer
into data frames.

 Main functions of data link layer are;

 Defining the Media Access Control (MAC) or hardware address.


 Defining the physical or hardware topology for connections.
 Defining how the network layer protocol is encapsulated in the data link layer
frame.

VELUSAMY DHARSHIKA Page 36 of 84


NETWORKING TECHNOLOGY

 Providing both connectionless and connection oriented services.


 Defines hardware (MAC) addresses as well as the communication process that
occurs within media.

3.2.1.7 Physical Layer


 Physical layer deals with communication media.

 This layer receive frame from data link layer and convert them in bits.

 It load these bits on actual communication media. Depending on media type these bit
values are converted in single.

 Some use an audio tones, while others utilize state transitions – change in voltage
form high to low and low to high.

 Specific protocols are needed for each type of media to explain the protocol but
patterns to be used, how data is encoded into media signals.

The next section will tell you how this different types of protocols work on this Flexi Lease
Finance (Pvt.) Ltd company network. Let’s assume user an A sending email message to user
B in a network.

A packet of is a basic unit of communication over the network. A packet is also called a
datagram a segment, a block, a cell or a frame, depending on the protocol network. When
data has to be transmitted, it is broken down into similar structures of data, which are
reassemble to the original data chunk once they reach destination (From user A to B) when
user A sends his email message, the network breaks the e-mail message into parts of a certain
size in bytes. These are the packets. Each packet is then sent off to destination (User B) by
the best available route. A route might be taken by all the other packets in the message or by
one of the other packets in the message.

This makes the network more efficient. First, the network can balance the load across various
pieces of equipment on a millisecond – by – millisecond basis. Second, it there is a problem
with pieces of equipment in the network while message is being transferred, packets can be
route around the problem, ensuring the delivery of the entire message.

VELUSAMY DHARSHIKA Page 37 of 84


NETWORKING TECHNOLOGY

In the same process, if there are other people sending a message on the network at the same
time when user A is sending his email message going to user B, the whole messages will be
in a queue in the order they were and will be delivered to their various destinations.

Each packet carries the information that will help it get to user B (destination) user A IP
address, user B IP address, something that tells the network how many packets this e-mail
message has been broken into and the number of this particular packet.

The packets carry the data in the protocols that the internet uses. Transmission Control
Protocol / Internet Protocol (TCP / IP). Each packet of the body of user an A message to user
B. A type packet contains perhaps 1000, 1500 bytes. When a server wishes to send data, it
uses the client network software to enclose the data in a packet containing a header and a
trailer.

The header and trailer contain information for the destination computer. For example, the
header contains the address of the of destination computer. The exact form the packets take is
determined by the protocol the network uses. When a data is put onto the network by a
server, each computer on the network examines the packet to see who it intended for. The
packet quickly dissipates if it is not recognized, allowing other packets to be send.

If we take the OSI model, packets travel form layer one to another as stated above. The
transport layer manages the end – to - end control for example, determining whether all
packets have arrived and error – checking. It ensures complete data transfer. The network
layer handles the routing of the data (sending it in right direction to the right destination on
outgoing transmissions and receiving incoming transmissions at the packet level), the
network layer does routing and forwarding. The physical layer also conveys the bit stream
through the network at the electrical and machine level.

It provides the hardware means of sending and receiving data on a carrier. The data link
layer provides synchronizes for the physical layer. The presentation layer, usually part of an
operating system, does the conversion pf incoming and outgoing data from one presentation
format to another for example, from a text stream into a popup window with the newly
arrived text. Sometime it is called syntax layer.

VELUSAMY DHARSHIKA Page 38 of 84


NETWORKING TECHNOLOGY

The application layer is where communication partners (different IP) are identified, quality of
service is identified, and user authentication and privacy are considered. The session layer
sets up, coordinates, and terminates conversations, exchange, and dialogues between the
applications at each when user A message is finally received by user B (destination).

VELUSAMY DHARSHIKA Page 39 of 84


Task: 04
4.1 Design a Network for Flexi Lease Finance (Pvt.)
Internet

Firewall

2nd Floor – Administration Department

Server

Switch

Router Router Router Router

Hub Hub Hub Hub

1st Floor – Loan Department 1st Floor – Saving Department 2nd Floor – Pawning Department 2nd Floor – Leasing Department
Computers Computers

5U
5U

Photo Copy Machine


Photo Copy Machine

Printer Printer Printer

5U
Department Head Department Head Executives Executives Department Head Executives Department Head Senior officer

5U

Photo Copy Machine

Figure 11(Network Infrastructure)

VELUSAMY DHARSHIKA Page 40 of 84


We designed this network for Flexi Lease Finance (Pvt.) Ltd. The building consists of two
floors and car park at the basement. The floor pal of office section is as follows;
1st Floor
 Loan Department
The section has a cabin for department head and another partition of ten computers which
one of them has a printer and only the department head have internet connectivity. Two
photocopiers are there in this section.

 Saving Department
There are four counters which has four computers and two printers. Also department head
and another two executives are there in three cabins. One photocopier is located.

2nd Floor
 Pawning Department
This department have four counters with computers and department head and a senior
executive cabins are located near them. Further two bill printing printers attached to two
computers.

 Leasing Department
This area has ten computers which also two all in one photo copiers. Also department head
and two senior officers reside in one partition.

 Server Room
The core switch, router and the servers are located here. Network Administrators room also
located here as well.

VELUSAMY DHARSHIKA Page 41 of 84


 This is Flexi Lease Finance (Pvt.) Ltd is a small scale organization has 2 floors, The
first floor there is a two departments and other floor has other two departments.
 There are 4 subnets and they all are connected to each other through the main switch.
This way all users of the company can access their information but there is the some
restrictions of each and every employees.
 The network is designed as separate 4 subnets of company Ethernet are connected to
the Internet through 4 separate Router and through the Firewall as it shown in figure
above.
 Main switch connected to the Server which is installed Windows 8.1 OS. This server
connected to the Internet through DSL modem/Switch.
 Each subnet computers are connected to each other through the Hub.
 There are two type servers; one is a printer server and other one is the FTP server.
Printer server is installed with Linux OS and server is installed with Windows 8.1 OS.
 Firewall is activated on the Server.
 FTP Server is installed with a networking software and Administrator set up and user
control and access the feature set up other information.
 The above network is designed in a way that even one of the Router fails, all other
computers will still be able to connect to the Internet through the other Router. We
connected 4 HUBS for this reason. It is the very big benefit for Flexi Lease Finance
(Pvt.) Ltd Company.

4.2 Setup the Network


We designed a Network in above section and now we need to set up that network. Before we
setup the network, we assume that all computers of the Flexi Lease Finance (Pvt.) Ltd
company has Windows 8.1 been installed.
 Everything we need to setup a Network;
 CAT5/CAT5e Network Cables.
 4 Routers with Firewall features.
 4 Hubs.

VELUSAMY DHARSHIKA Page 42 of 84


 Steps we need to follow setup a network;
 First, we need to connect all 10 computers of Loan Department to the HUB in
the same department, and then all other computers of Departments also have
to be connected to the HUB, using CAT5/CAT5e cables to connect our
computers to HUBS. We use RJ45 connectors with CAT5/CAT5e cables to
connect.
 Then we connect 4 HUBS with each other using the same type of cable and
connectors (CAT5/CAT5e cable and RJ45 connectors).
 Then we connect each HUB to a router in each department.
 Routers are connected to the DSL or cable modem.
 Through a DSL or cable modem we connect to the internet.

4.3 Configure the Network


There are more than one way of configuring a Network. For this task we will choose the
simplest way.
 Steps we need to follow to configure a Network;
 We need to create a workgroup and give it a specific Name.
 When we take this company it has different types of departments each
departments is different type of category and the set of procedure are different and
if we take one department we need to add all computers with specific names to the
same workgroup. That way they will be able to communicate with each other in
same Workgroup.
 We need to activate the Routers and the Firewall capabilities.
 File sharing on this Network should be activated on each computer.
 We can assign a Network Manager as an Administrator and users have specific
names using a specific Network software.
Administrator manages the whole Network. An administrator creates usernames and
passwords for the user computers to Login. An administrator gives right to each user to
access to specific files. Users cannot see everything they want on the Network. They have
restricted rights on the Network. They can only access to the files that were shred by
everyone and the files that an Administrator gave him access. Administrator can control all

VELUSAMY DHARSHIKA Page 43 of 84


the network, and department heads have other controls of the each department areas depend
on the internet and file transferring authority area.

Task – 05
5.1 Role of Software and Hardware Components
Network devices are components used to connect computers or other electronic devices
together so that they can share files or resources like printers or fax machines. Devices used
to setup a Local Area Network (LAN) are the most common type of network device used by
the public.

Figure 12(Devices)

5.1 Hubs
 A device that connects the cables form computers and other devices such as printers
in an Ethernet local area network.
 Hubs are used for star topology networks, but they are often used with other
configurations to make it easy to add and remove computers without bringing down
the network.
 Smart hubs or switching hubs are often used to improve performance by managing
traffic.
 There are two types of hubs; active and passive.
 Passive hubs simply connect all ports together electrically and are usually not
password.

VELUSAMY DHARSHIKA Page 44 of 84


 Active hubs use electronics to amplify and clean up the signal before it is broadcast to
the other ports.
 Hubs are devices used to link several computers together.
 It works in physical layer of OSI model.

Figure 13(Hub)

5.2 Routers
 Routers are highly intelligent devices that connect multiple network types and
determine the best path for sending data.
 The advantage of using a router over a bridge is that data can take to get to its
destination.
 Like bridges, they can segment large networks and can filter out noise.
 However, they are slower than bridges because they are more intelligent devices; as
such, they analyze every packet, causing packet forwarding delays. Because of this
intelligence, they are also more expensive.
 Routers are normally used to connect one LAN to another. Typically, when a WAN is
set up, there will be at least two routers used.
 Routers are OSI network layer 3 devices.

VELUSAMY DHARSHIKA Page 45 of 84


Figure 14(Routers)

5.3 Switch
 A network switch is a computer networking device that connects network segment.
 Low – end network switch appear nearly identical to network hubs, but a switch
contains more “intelligence” (and a slightly higher price tag) that a network hub.
 Network switches are capable of inspecting data packets as they are received,
determining the source destination device of the packet, and forwarding it
appropriately.
 Popular MAC address table on the basis of source MAC address of a frame.
 Data link layer or layer 2 device.
 A vital difference between a hub and a switch is that all the nodes connected to a hub
share the bandwidth among themselves, while a device connected to a switch port has
full bandwidth all to itself.
 For example, if 10 nodes are communicating using a hub on a 10 Mbps network, then
each node may only get a portion of the 10 Mbps if other nodes on the hub want to
communicate as well.
 But with a switch, each node could possibly communicate at the full 10 Mbps.

VELUSAMY DHARSHIKA Page 46 of 84


Figure 15(Switch)

5.4 Gateways
 A gateways is a network point that acts as an entrance to another network. On the
internet, in terms of routing, the network consists of gateway nodes and host nodes.
 Host nodes are computer of network users and the computers that serve contents (such
as Web pages).
 Gateway nodes are computers that control traffic within your company’s network or
at the your local service provider.(ISP)
5.5 Solution of the Flexi Lease Finance (Pvt.)
Before one can being to setup a Flexi Lease Finance (Pvt.)’s network they must first be sure
they have a network interface card, commonly referred to as a NIC. A NIC is a device that
connects a computer or other device to a network. For computers, the NIC is usually installed
in an expansion slot and has a chip that handles the physical and data- link layer of the
network communication.

To establish your network you will need a few key components. If you plan to access the
internet you will start your network off with a cable modem. This type of modem is designed
to operating using existing cable lines. Cable internet has a high bandwidth and can support
most, if not, all applications you will be using.

The second component is a router. A router is a device that routes data form one network or a
network. A router is connected to at least two networks, commonly two networks or network
and its ISP’s network. A router allow for everyone on the network to access the internet.

VELUSAMY DHARSHIKA Page 47 of 84


The next component that you will need to setup a network is a hub or sometimes a switch. A
hub is device that connects the cable form computers and other devices such as printers in a
network. For an example if we take the Flexi Lease Finance (Pvt.) has different types of
departments, each department has printers. Traditionally, hubs are used for star topology
networks, but they are often used with other configurations to make it easy to add remove
computers without bringing down the network which the very big benefit of the Flexi Lease
Finance (Pvt.). A hub can be either active or passive; simple forwarding messages or
amplifying or refreshing the data.

A switch device similar to a hub that enables the connection of multiple computers, access
points, and other network enables devices. The different between a hub and switch is that a
switch filters the data that passes through it and a hub does not.

These components have all been modified and are cable of establishing wireless networks. A
router can be purchased with wireless capability but a more efficient way of adding wireless
to Flexi Lease Finance (Pvt.) network is to simply add wired access point.

Another key component is a print server. A print server is used to connect printers to a
network to allow for network printing. The server will act as a buffer; string the messaging
and printing them in order of the queue. This device can drastically reduce the cost of
networking because now everyone can use the same printer without having a printer attached
to every computer.

Network software is needed to perform network functions. In a LAN, some type of network
software is typically installed in each computer on the network, and a network operating
system is run on the network servers. Two of the most common LAN networking packages
are Microsoft Windows (Windows 8.1) in NT. Functions of network software include file
transfer and real –time messaging, automatic formatting of e- mail, and creating directions
and unique addresses for each node. Management utilities such a problem detection,
performance analysis, configuration assistance, usage and accounting management (billing),
and network security are usually included in network software package.

Comparison of network operating system

VELUSAMY DHARSHIKA Page 48 of 84


Task: 06
6.1 Servers
A server in non – technical language is a computer system that conducts or hosts several
computer services in order to ensure that computers in a network or the internet can
communicate in turn making two or more people on different computers communicate
effectively. There are several types of servers and they are classified depending on the king of
work they do, they are;
 Web servers
 Mail servers
 Application servers
 File servers
 Proxy servers
 Real – time servers

VELUSAMY DHARSHIKA Page 49 of 84


6.1.1 Types of Servers
The multiple types of servers or types of network servers are as follow;
6.1.1.1 File Server
 File servers are high – end computers that operate on networks to store files, media,
documents, folders, and database.
 A file servers is a central point of a network and is connected to all other network
computers.
 All other networked systems are known as clients and can access files on the server.
 File servers are not capable of programming or calculations since they only act as
access points of data storage and retrieval.
 File servers allow data to shared and copied over a network.
 The use of removable devices like floppy disk and disk drivers can be completely
eliminated by using file servers.
 Any computer with a capacity of handling a file request can be set up as a file server
in a network.
 File servers may also be categorized by the method of access; internet file servers are
frequently accessed by File Transfer Protocol (FTP).
6.1.1.2 Transection Server
 Microsoft Transaction Server (MTS) is an integral part of Windows NT, and is
installed by default as part of the operating system in NT.
 It is a service in much the same way as Internet Information Server or the file and
print services that we now take for granted.
 In other words, it is a part of the system that is available in the background whenever
one of our applications requires it.

6.1.1.3 Database Server


 Database management systems (DBMS) can be divided into three primary
components: development tools, user interface & database engine.
 The database engine does all the selecting, sorting, and updating.

VELUSAMY DHARSHIKA Page 50 of 84


 Currently, most DBMS combine the interface and engine on each user’s computer.
 Database servers split these two functions, allowing the user interface software to run
on each user’s PC (the client), and running the database engine in a separate machine
(the database server) shared by all user

6.1.1.4 Fax Server


 A fax server receives documents from users on the network, converts them to faxes,
and then sends them over the telephone line or internet.
 It also receives incoming faxes, stores them, and sends them along to individual users.
 User on the network can send documents to the fax server in a couple of ways.
 Uploading faxes through a web interface requires special client’s software, but most
fax software programs are not overly expensive.
 It is one of the best options for organization that seek minimum incoming and
outgoing telephone resources, but require to fax actual documents.
 To receive incoming faxes, the software can send users and email with their fax
document attached as PDF file.

6.1.1.5 Web Server


 It provides static content to a web browser by loading a file from a disk and
transferring it across the network to the user’s web browser.
 This exchange is intermediated by the browser and the server, communicating using
HTTP.

6.1.1.6 Application Server


 An application is a server program that resides in the server (computer) and provides
the business for the application program.
 The server can be a part of the network, more precisely the part of the distributed
network.

VELUSAMY DHARSHIKA Page 51 of 84


 Application servers are mainly used in web based applications that have a 3-tier
architecture.
 First Tier: Front End – Browser: GUI interface lying at the client/workstation.
 Second Tier: Application server - Set of application programs.
 Third Tier: Back End: Database server.
 Also known as a type of middleware, it occupies a substantial amount of computing
region between database servers and the end users, and is commonly used to connect
the two.
Following section will explain you to what types of the servers recommended to Flexi Lease
Finance (Pvt.).
Database Server
Database servers are very important parts of companies and for other works. This servers are
used all over the world and for all sorts of things. I will be using database servers in Flexi
Lease Finance (Pvt.) Ltd to provide the each department employee details, clients detail,
transections details, salary details, such as other records and history.

Database servers are computers designed to provide a specific server to save data or
information of the Flexi Lease Finance (Pvt.) Ltd Company. This servers allow to use
inserting the details, deleting the details, updating the details and search the details. Each and
every functions will help to main the proper records. It could be more usable and very
security for the company.
FTP Sever
This is another important server for the Flexi Lease Finance (Pvt.) Ltd Company. FTP server
becomes necessary for business that mage their own network and need to establish file
transfer connection to facilities the exchange documents between company employees.

Already said in this company has different types of departments and employees are not
working together there are in different apartments, in this situation definitely we should t
implement this server to share the information into the FTP server, it could be the best
communicate way of this company. This not only for the employees other department head
should communicate the administration or sharing the important company dealings and the
reports. Which could be more right choice to the Flexi Lease Finance (Pvt.) Ltd Company.

VELUSAMY DHARSHIKA Page 52 of 84


Print Server
Print server also another important server for Flexi Lease Finance (Pvt.) Ltd Company. End
users may connect and print to share printers in several ways. In this organization have
several sharing a printer attached directly to office data network. In this type of environment,
each user often acts as the administrator of an individual machine or there is a single person
who performs computer administration and management tasks in addition to their other
responsibilities.

Mail Server
One of the instant forms of business communication is email. But email has several downfalls
to go along with its benefits that make it a change way to send information. This mail server
is very important tool of the business. Because in this business they are making some
transection throw the mail. Not only for the transection as well as salary details, clients
record. One of the fast communication way is the email.

The very big advantage email has over the telephone in communication speed is that you can
send attachments with an email that contain important document or even a presentation to
clarity the message. I would recommended this is the best method of communication with
others.

Task: 07
All users of the Flexi Lease Finance (Pvt.) Ltd company will have their computers software
will be installed and configure according to the schema above and their network will be
setup.
Every department is in different subnet. There are three different subnets and they all
connected to each other through the main switch. This way all users of the company can
access their information on the net regardless of their departments.

Main switch is connected to the web server which is installed Windows 7 OS. Web server is
connected to the intent xDSL modem/Switch. Each subnet computers are connected to each
other through the Hub. Printer server is installed with Linux OS and web server is installed

VELUSAMY DHARSHIKA Page 53 of 84


with Windows 7 OS. Each departments have an access to printer server through their routers.
Firewall is activated on the server.

There are more than one way of configuring a Network. For this task we will choose the
simplest way.
 We need to create a workgroup and give it a specific Name.
 When we take this company it has different types of departments each
departments is different type of category and the set of procedure are different and
if we take one department we need to add all computers with specific names to the
same workgroup. That way they will be able to communicate with each other in
same Workstation.
 We need to activate the Routers and the Firewall capabilities.
 File sharing (FTP) on this Network should be activated on each computer.
 We can assign a Network Manager as an Administrator and users have specific
names using a specific Network software.
Administrator manages the whole Network. An administrator creates usernames and
passwords for the user computers to Login. An administrator gives right to each user to
access to specific files. Users cannot see everything they want on the Network. They have
restricted rights on the Network. They can only access to the files that were shared by
everyone and the files that an Administrator gave him access. Administrator can control all
the network, and department heads have other controls of the each department areas depend
on the internet and file transferring authority area.

This only for the one detainment hardware and software specification.
Manufacture. Cabinet type: Dell
Operating System: Windows 8.1.
Processor. Manufacture: Intel
Type: Intel Core i3-3240

Speed: 3.4GHz
Bus Speed: 1000MHZ
 Motherbo Form Factor: Micro-ATX.
Chipset: Intel B75 Chipset.
ard.
No of PCI Slots: 2
Peripheral Connectors USB2.0(2) , Speakers

VELUSAMY DHARSHIKA Page 54 of 84


(Font):
Peripheral USB 2.0(5), VGA out, Earth net (Rj-45),
Connectors(Back): Stereo Line-in, Microphone, Speaker Line-
out, Serial and Parallel ports.
Storage Drives. Hard Drive Capacity: 200GB.
Hard Drive interface: SATA, 7200RPM.
Memory Memory Type: DDR2 SDRM.
Installed memory: 4GB.
Upgradable: UP TO 4GB.

CD/DVD Drives. Optical Drive Type: DVD-RW


Monitor. (Display) Screen Type: LED Screen.
Resolution: 1280 x 1024 or more
Diagonal size: 17” or more.
Sound Card. Type: Integrated Digital Audio.
Interface Type: Integrated.
Browser Support Type: Microsoft Internet Explorer.
Chromium Browser.
Keyboard USB Enhanced QWERTY Keyboard.

Mouse USB Optical 2 button scroll mouse


Speakers Built in speaker, Integrated sound speaker.
Power Supply.
Network Type: Microsoft TCP/IP Ethernet Network Adaptor
File system Type: FTP

Flexi Lease Finance (Pvt.) Ltd


Floors Departments Equipment
1st Floor Loan Department Cabin - 01
Computers - 10
Printer - 01
Photocopy machine - 02
Saving Department Counters - 04
Computers - 04
Printers - 02
Cabins - 03
Photocopy machine - 01

VELUSAMY DHARSHIKA Page 55 of 84


Figure 16(Loan Department)

Figure 17(Saving Department)

Flexi Lease Finance (Pvt.) Ltd


Floors Departments Equipment

VELUSAMY DHARSHIKA Page 56 of 84


2nd Floor Pawning Department Counters - 04
Computers - 06
Cabins - 02

Printers - 02
Leasing Department Cabins - 02
Computers - 10
Photocopy machine - 02
Sever Room Cabins - 01
Computer - 01
Printer - 01

Switch, router, server.

Figure 18(Pawning Department)

VELUSAMY DHARSHIKA Page 57 of 84


Figure 19(Leasing Department)

Task: 08
10.1 Feedbacks

Name V. Mavine Silva.

Emp. No 1529.

ID 751345673546V.

Designation Department Head.

Department Loan Department.

Feedbacks  Communication is one of the biggest advantages of the company.

 Computer networks are serving as the backbone of the daily


communication from top to bottom level of our company.

 Another wonderful advantage of computer networks is the data


sharing. All the data such as documents, files, account

VELUSAMY DHARSHIKA Page 58 of 84


information, reports can be sherd.
 Computer networks save a lot of cost for our organization.
Building up links through the computer networks immediately
transfer files and messages to the other people which reduce
transportation and communication expense.
Table 1(Feedback – Department Head)

Name S. David.

Emp. No 2098.

ID 882344345634V.

Designation Cashier.

Department Loan Department.

Feedbacks  The major advantage of networking is that is allow file sharing


and remote file access.

 Computer networks are multiply processed. Many of users can


access the same information at the same time.

 Reduce the cost.


Table 2(Feedback - Employee)

Name D. Preethi Vignesh

Emp. No 5045

ID 7256553445V

Designation Department Head

Department Saving Department

Feedbacks  Computers can be managed centrally – with the same software


installed each one.

 It is much faster to install an application once on a network – and


copy it across the network to every workstation.

 Sharing and transferring files within networks are very rapid. Thus
saving time, while maintain the integrity of the file.

VELUSAMY DHARSHIKA Page 59 of 84


 Another important advantage of networking is the ability to share
hardware. For an example, a printer can be shared among the each
department users in a network.
Table 3(Feedback – Department Head)

Name J. Srihari

Emp. No 2078

ID 1991

Designation Receptionist

Department Saving Department

Feedbacks  Very easy to communicate through a network. People can


communicate efficiently using a network a group of people.

 Sensitive files and programs on a network can be password


protected. Then those files can only be accessed by the authorized
users.

 Computer network resolve this issue as the software can be stored


or installed on a system or a server and can be used by the
different workstations.
Table 4(Feedback - Employee)

Questionnaires for Flexi Lease Finance (Pvt.) Ltd (Customer)


Thank you for coming at “Flexi Lease Finance” (Pvt.) Ltd. Please take the few moments to
fill out the following, which, in turn will help us to improve and provide you with a better
services.
NOTE: The information you provide are regarded as anonymous and will not be used
at any circumstances.
No Questions Yes No No Comments
01 Are you satisfied with the services at Flexi
Lease Finance (Pvt.) Ltd.
02 Is the staff helpful in guiding through the
finance company?
03 Are the cashiers efficient enough?

04 Are you satisfied with the customer care our

VELUSAMY DHARSHIKA Page 60 of 84


staff provide?
05 Do you feel any difference between “Flexi
Lease Finance (Pvt.) Ltd.” and other finance
companies?

Additional Notes/ Suggestions you think, that could improve our services and care
towards you:

Thank you for your precious time, please you can have all the facilities at “ Flexi Lease
Finance (Pvt.) Ltd” company.

Task: 09
9.1 Test Results
Windows Server 2008 R2 is a network operating Microsoft, and can be deployed in medium
to large scale industries like Flexi Lease Finance (Pvt.) in order to allow administrators to
centrally manage the entire network setup right form the single location. Because it is the
huge company that’s why networking setup should implement for each and every uses.

9.1.1 System Requirements


Before installing Windows Server 2008 R2, the computer must meet the following minimum
system requirements.
 1.4 GHz x86/x64 or 2 Processor.
 512 MB RAM (2 GB recommended)
 Super VGA or higher display

VELUSAMY DHARSHIKA Page 61 of 84


 32 GB disk space (10 GB for Foundation Edition)
 DVD drive
 Keyboard and pointing device.

9.1.2 Install Windows Server 2008


1. Power on the computer on which Microsoft Windows Server 2008 R2 is to be
installed.
2. Enter into the BIOS setup to make the computer boot from DVD.
3. Insert Microsoft Windows Server 2008 R2 boot bootable installation media.
4. Once inserted, reboot the computer.
5. On the Install Windows scree, click next.

Figure 20(Install Windows)

6. On the next page, click install now.


7. On Selected the Operating System want to install page, from the displayed Window
Server 2008 R2 edition, select the appropriate edition that is to be installed.

VELUSAMY DHARSHIKA Page 62 of 84


Figure 21(Operating System)

8. On the Please read the License terms page, check I accept the license terms checkbox
and click next.

Figure 22(License Terms)

VELUSAMY DHARSHIKA Page 63 of 84


9. On next page which type of installation do you want page, click custom (advanced).

Figure 23(custom (advanced))

10. On where do you want to install Windows page, ensure that the hard drive on which
Windows Server 2008 R2 is to be installed is selected.
11. Once selected, click Drive options (advanced).

VELUSAMY DHARSHIKA Page 64 of 84


Figure 24(Drive Options)

12. From the enabled options, click New to create a new disk drive partition.
13. On the size field, specify the size of the new volume in MB.

Figure 25(Disk Drive Partition)

14. On the Installing Windows page, wait till the Windows Server 2008 R2 installed and
the computer get restarted.

VELUSAMY DHARSHIKA Page 65 of 84


Figure 26(Installing Windows)

15. Don not press any key if the screen displays the message, “Press any key to boot from
CD or DVD” while computer restarts for the first time, to resume the installation
process.
16. After second restart, on the displayed screen, click ok to change the user password
before logging on for the first time.
17. On the available fields, type and retype the new password and press enter.

Figure 27(Login Form)


18. On the next confirm screen, click ok to log on to Windows Server 2008 R2 computer.

VELUSAMY DHARSHIKA Page 66 of 84


19. Once we open the screen, the user can click on Internet Protocol Version 4 in the
Networking box.
20. Then click the Properties. Change the radial button to use the following IP address;
and then enter the settings for the specific server and network IP addresses.

Figure 28(IP address)

9.1.3 Configure the Domain Controller


Here I will be explaining the Domain Services and configure of a new Domain Controller to
the Flexi Lease Finance (Pvt.) Ltd.
1. Log into the Windows Server and start the Server manager.

2. Navigate to the Server Roles tab and press on the “Add Roles” button.

VELUSAMY DHARSHIKA Page 67 of 84


Figure 29(Server Manager)

3. The add Roles Wizard is going to open up, click next.

Figure 30(Add Roles Wizard)

VELUSAMY DHARSHIKA Page 68 of 84


4. The Wizard will display a list of Roles. Choose the Active Directory Domain Services
Role.

Figure 31(Active Directory Domain Services)

5. The Active Directory Domain Service requires adding feature to the server. Click on
“Add required features” on the appearing screen and then click on next.

Figure 32(Add Roles Wizard)

VELUSAMY DHARSHIKA Page 69 of 84


6. On the following screen click on install and wait for the installation to finish. When
the installation finishes click on close.

Figure 33(Installation Progress)

7. At this point the Activate Directory Domain Services are not configured yet.

Figure 34(Activate Directory Domain Services)

VELUSAMY DHARSHIKA Page 70 of 84


8. If we click on Activate Directory Domains Services button we get to the following
screen. Our next step will be configuring Active Domain Services using dcpromo.exe.

Figure 35(Activate Directory Domain Services)

9. We are about to start the Active Directory Domain Services installation Wizard.

Figure 36(Installation Wizard)

VELUSAMY DHARSHIKA Page 71 of 84


10. Navigation to the following screen. Choose the “Create a new domain in a new forest
option” and click on next button.

Figure 37(Installation Wizard)

11. Type in Flexi Lease Finance (Pvt.) Ltd Domain name.

flexi.Lease.com

Figure 38(Domain name)

VELUSAMY DHARSHIKA Page 72 of 84


12. Choose the forest function level on the drop box.

Figure 39(Functional Level)

13. If the Domain Controller is a stand-alone server we don’t have to choose the DNS
server option. If otherwise, it’s recommended to leave it checked.

Figure 40(DNS)

VELUSAMY DHARSHIKA Page 73 of 84


14. When the wizard finished configuring the settings reboot the server.

Figure 41(Configure)

15. The install is complete, click finish.

Figure 42(END)

VELUSAMY DHARSHIKA Page 74 of 84


Task: 10
10.1 Security, Bandwidth, Quality
Data that send over a wireless network is even more subject to interception than that send
over an Ethernet network. Hackers don’t need physical access to the network or its devices;
anyone with a wireless – enabled portable computer and a high gain antenna can capture data
and or get into the network and access data stored there if the wireless access point isn’t
configured securely.

10.1.1 Increase the firewall protection


I would like to recommend to increase the firewall protection for both side. Which means
hardware device and software programs. Already we gave the firewall protection but not for
all the hardware and software’s. But after one year period if we increase the firewall
protection it could be give more secured for all the devices.

But now a days firewalls are integrated with the routers. If we implement department firewall
intended for the organization, it can monitor network traffic for a certain number of
computers. It can offer some reporting on the type of information that the employees tried to
access or on incoming threats.

10.1.2 Change into Fiber optic cable


Already I have mentioned above task now we are using CAT5/CAT5e Network Cables but
after one year period we can exchange into Fiber optic cables. Let’s discuss the Fiber optic
cables.

Figure 43(Fiber Optic)

VELUSAMY DHARSHIKA Page 75 of 84


 Optical fiber is glass or plastic that carries light along its length. Fiber optics is the
overlap of applied science and engineering concerned with the design and application of
optical fibers.
 Optical fibers are widely used in fiber-optic communications, which permits transmission
over longer distances and at higher bandwidth (data rates) that other forms of
communications.
 Fibers are used instead of metal wires because signals travel along them with less loss,
and they are also immune to electromagnetic interference.
 Fiber used for illumination, and are wrapped in bundles so they can be to carry images,
thus allowing viewing in tight spaces.
 Specially designed fibers are used for a variety of other applications, including sensors
and fiber lasers.

Now let’s discus about the advantages of the Flexi Lease Finance (Pvt.) Ltd company.

Bandwidth: Fiber optic cables have a much greater bandwidth than other cables especially
metal cables. The amount of information that can be transmission media is its most
significant advantage.
Low Power Loss: Optic fiber offers low power loss. This allows for longer transmission
distances.
Security: This optical fibers are difficult to tap. As they do not radiate electromagnetic
energy, emissions cannot be intercepted. Fiber is the most secure medium available for
carrying sensitive data.
Cost: The cost for fiber cable, components, and hardware has steadily decreased. Overall.
Fiber cable is more expensive than copper cable in the short run, but it may be less expensive
in the lone run.

VELUSAMY DHARSHIKA Page 76 of 84


Task – 11
11.1 Maintain Schedule for Week (Flexi Lease Finance (Pvt.) Ltd.
Sunday Monday Tuesday Wednesday Thursday Friday Saturday

Anti –Virus Anti –Virus Anti –Virus Anti –Virus Anti –Virus Anti –Virus Anti –Virus
updates Every 4 hours updates Every 4 hours updates Every 4 hours updates Every 4 hours updates Every 4 hours updates Every 4 hours updates Every 4 hours

Hardware and Hardware and


software checking software check

Unknown files Unknown files


removable removable

Logical space check


Logical space check

Quick spyware Quick spyware Quick spyware Quick spyware Quick spyware Quick spyware Quick spyware
scan and removal scan and removal scan and removal scan and removal scan and removal scan and removal scan and removal

Security path Security path Security path


deployment deployment deployment

S.M.A.R.T S.M.A.R.T
Monitoring check. Monitoring check.

VELUSAMY DHARSHIKA Page 77 of 84


11.2 Server Maintains
Schedule of Work Time

Review system logs for errors and potential problems. Twice a week

Review service pack and hotfix installation history. Twice a week

Review hard disk usage and health reports. Twice a week

Review system backup process and disaster recovery status. Twice a week
 Update emergency repair disks.
 Test backup media.
 Configure data set that is being backed up.

Review Antivirus Protection Once a week


 Check program version and signature files
 Review scan history log for virus alerts.
 Review exclusion and exemption list for potential issues.
 Verify that scheduled updates are being performed.

VELUSAMY DHARSHIKA Page 78 of 84


11.3 Network Maintenance
Schedule of Work Time

Document network devices (hubs/switches/routers) Once a month

Review device configuration Once a month

Review firewall configuration Once a month

11.4 Workstation Maintenance


Schedule of Work Time
Review disk usage Once a month
Review hardware statistics Once a month
Review hotfix and service pack install service Once a month
Operating System updating Every 3 month
Antivirus updating Once a week
Software updates Every 3 month
Cleaning out the hardware and checking all components. Every 6 months
Physical inspection of the CPU and motherboard for failed Every 6 months
components.

VELUSAMY DHARSHIKA Page 79 of 84


Appendix – A
May 2015 Jun 2015 Jul 2015 Aug 2015
ID Task Name Start Finish Duration
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24

1 Project Proposal 2015-05-04 2015-05-06 3d

2 Requirement Gathering 2015-05-06 2015-05-12 5d

3 Requirements Document 2015-05-12 2015-05-14 3d

4 Feasibility Study 2015-05-14 2015-05-15 2d

5 Schedule & Gantt Chart 2015-05-15 2015-05-15 1d

6 Purchased Required Materials 2015-05-18 2015-05-26 7d

7 Network Connection Design 2015-05-26 2015-06-19 19d

8 Hardware Design 2015-06-22 2015-06-26 5d

9 Implement the Design 2015-06-04 2015-06-29 18d

10 Complete Hardware Design 2015-06-29 2015-07-10 10d

11 Design Document Draft 2015-07-13 2015-07-13 1d

12 GUI Design 2015-07-14 2015-07-14 1d

13 User manual Design 2015-07-15 2015-07-20 4d

14 Final Design Document 2015-07-21 2015-07-28 6d

15 Network Framework 2015-07-28 2015-08-12 12d

16 Test Plan 2015-08-12 2015-08-14 3d

17 Documentation 2015-08-14 2015-08-14 1d

18 Quality, assurance analysis 2015-08-17 2015-08-20 4d

19 Presentation Preparing 2015-08-24 2015-08-24 1d

VELUSAMY DHARSHIKA Page 80 of 84


References
1. communication, F.-O. (2015, 08 11). http://www.teach-
ict.com/as_a2_ict_new/ocr/A2_G063/333_networks_coms/optical_wireless/miniweb/
pg3.htm. Retrieved from Fiber-Optic communication.

2. Fiber-Optic. (2015, 08 06). http://techblog.cosmobc.com/2013/03/19/advantages-


fiber-optic-communication-systems/. Retrieved from Fiber-Optic.

3. Server, M. (2015, 07 30). http://www.worldstart.com/the-advantages-of-owning-your-


own-mail-server/. Retrieved from Mail Server.

4. Server, T. A. (2015, 08 4). http://science.opposingviews.com/advantages-using-proxy-


server-4226.html. Retrieved from The Advantages of Using a Proxy Server.

5. Server, T. B. (2015, 07 21). http://www.allbusiness.com/the-benefits-of-a-fax-server-


4057747-1.html. Retrieved from The Benefits of a Fax Server.

6. Servers. (2015, 08 03). http://www.webupd8.org/2010/02/differences-between-3-


types-of-proxy.html. Retrieved from Servers.

7. technology, B. (2015, 08 05). http://www.buzzle.com/articles/advantages-and-


disadvantages-of-bluetooth-technology.html. Retrieved from Bluetooth technology.

8. Technology, N. (2015, 07 29). http://www.slideshare.net/Atinkumaragarwal/wimax-


27488045. Retrieved from Network Technology.

9. WAP. (2015, 08 4). http://www.slideshare.net/Alihabeeb/wap-29406779. Retrieved


from WAP.

10. WAP. (2015, 08 08). http://www.tutorialspoint.com/wap/wap_introduction.htm.


Retrieved from Tutorial Point.

VELUSAMY DHARSHIKA Page 81 of 84


VELUSAMY DHARSHIKA Page 82 of 84

You might also like