Professional Documents
Culture Documents
Anindita Term Paper Nahida Maam
Anindita Term Paper Nahida Maam
PREPARED FOR,
ID NAMES
029-13-013 Mohammad Nesar Uddin
029-13-035 Al-Amin
029-13-069 Saima Hasnain
029-13-079 Shafiqul Islam
029-13-121 Anindita Khan
Letter of Transmittal
19.12.2023
Subject: Submission of term paper on the topic- Networking and Data communication:
A Study on MIS LAB, University of Dhaka.
Dear Ma’am,
We want to humbly state that we have been assigned to complete a term paper on
networking and data communication: A Study on MIS LAB, under the course
Networking: Telecommunication, Corporate and Social.
Our Group tried our best to prepare this term paper to, while preparing the term
paper, we have researched about the MIS LAB, in support from the lab assistant. The
term gave us a great opportunity know about our overall lab overview. We therefore,
pray and hope that you would kindly accept our term paper and oblige thereby.
Sincerely yours,
Group 7
University of Dhaka
Acknowledgement
We would like to express our gratitude to our Almighty ALLAH who has helped to
complete this great work.
Later, we are very grateful to our course teacher Ms. Nahida Sultana, Lecturer at
Department of Management Information Systems, University of Dhaka who has
directed and supported us to prepare this task.
We enjoyed the course for our honorable course teacher who always cooperated us to
know different thing and to gather dynamic knowledge.
Again, we express our gratefulness to our Madame who conducted our course
throughout the semester.
Sincerely,
Group 7
Section A
Batch:13th
Department of Management Information Systems
University of Dhaka
Executive summary
The main objective of this group term paper is to overview the MIS LAB history and to know the
layout and configuration used in the lab and how does the networking work in the lab.
The necessary information was taken from by researching our MIS LAB. We have described all
the configuration used in the MIS lab.
Overall this term paper has helped us to know deeply about the network configuration
of our MIS LAB and its layout. We have also known about the networking devices used
in the lab. We also gave some recommendations for future improvements of existing
structure.
Introduction
This study examines how our lab is transformed into a dynamic, cooperative, an
d technologically advanced space by NComputing vSpace and offers some recom
mendations for improving the lab based on NComputing.
Objectives of the study
We now know more about the University of Dhaka's MIS lab thanks to this study.
Every networking gear used in the lab is introduced to us.
Additionally, we are fully aware of how the networking equipment operated in
the lab.
The purpose of this study was to learn more about networking devices.
The lab's operations have been examined, and Ncomputing's operations are me
ticulously documented. The benefits and drawbacks are also explained.
Findings
Through questioning, the major data was gathered from MIS lab help.
We have gathered as much valuable information as much as we could. All the
Secondary data was gathered from several websites and papers relevant to the
MIS lab.
Overview
Networking and virtualization are essential components in the development of I
T systems.
Networking is used by virtualization to create channels of communication betwe
en virtual instances and external systems.
This cooperation is most visible in virtual switches and virtual local area network
s (VLANs), where virtualized network components make it easier to isolate and s
egment traffic, enhancing both performance and security.
By placing a virtualized layer over conventional physical networks, network virtu
alization produces a more dynamic and adaptable environment that can change
to meet the demands of workloads that are virtualized.
Through this connection, businesses can streamline the management of
complex infrastructures by achieving a higher degree of automation and orchest
ration.
NComputing:
• Thin clients: These are low-cost, tiny devices that connect to a central server.
They often feature limited processing power and storage, but they give users
with a full desktop experience.
• Virtualization software: You can use this software to create several virtual desk
tops on a single physical server.
Each virtual desktop can be utilized by a different user and can run different
applications concurrently.
• Management tools: These tools let you manage your NComputing
environment by allowing you to add and remove users, assign rights, and
monitor performance.
Benefits of NComputing
• Cost Effectiveness:
NComputing saves money on hardware by allowing several users to share a singl
e server.
• Energy Savings:
With fewer physical machines, energy consumption is reduced significantly.
• Scalability:
Scale up or down as needed by adding or removing NComputing devices.
• Centralized Management:
Streamlined resource and user session management.
VSpace:
NComputing's VSpace product range provides software and hardware solutions
for virtual desktop infrastructure (VDI) and thin client computing.
It enables numerous users to access the same computer at the same time, each
with their own virtual desktop environment.
• vSpace Pro: For small and medium-sized enterprises, vSpace Pro supports up t
o 100 concurrent user sessions per
host system.
• vSpace Enterprise: For large businesses that require an infinite number of user
sessions as well as sophisticated capabilities such as centralized management,
security, and compliance.
• Cost savings: When compared to typical PCs, vSpace saves money on hardwar
e by sharing a single computer.
• Energy efficiency: vSpace's thin clients use less energy than standard PCs.
• Scalability: vSpace is simply scalable to accommodate an increasing number of
users.
• Security: To keep data secure, vSpace includes features such as user
authentication and encryption.
• Simple administration: Administrators can manage all vSpace instances from a
single terminal.
Virtualization of server
Types of hypervisors:
• Type 2 hypervisors: Type 2 hypervisors, also known as hosted hypervisors, run on top
of an operating system.
VMware Workstation, Oracle VM VirtualBox, and Microsoft Virtual PC are
examples of type 2 hypervisors.
• Web hosting: With server virtualization, web hosting companies may host
several websites on a single physical server.
• Cloud computing: The core of cloud computing is server virtualization, which
enables enterprises to rent computing resources on demand.
• Desktop virtualization: Using server virtualization, users can build virtual
desktops that can be accessed from any device.
• Development and testing: Server virtualization can be used to create isolation
between development and testing environments and production systems.
DHCP Server
• Assigns IP addresses: DHCP servers keep an IP address pool and lease them to
devices that request them.
This eliminates the need for manual setting and ensures that all devices on the
network have unique IP addresses.
When a DHCP-enabled client joins to the network, the DHCP server assigns an IP
address from a pool that it maintains.
Because IP addresses are leased dynamically rather than statically, when they
are no longer in use, they are automatically returned to the pool for reallocation
The network administrator configures DHCP servers to save TCP/IP configuration
data and transmit address configuration to DHCP-enabled clients in the form of a
lease offer.
DNS Server
A DNS server, also known as a name server, is an important part of the internet
architecture. It functions as the internet's phonebook, converting human-
readable domain names (such as google.com) into numerical IP addresses that
computers can understand.
You can now simply access websites and other online resources without having
to remember their IP addresses.
• Easier access to online resources: Because you don't have to remember IP add
resses, you can access websites and other online resources more easily.
• Increased efficiency: DNS servers cache IP addresses, reducing the number of
times they must be searched up and increasing internet browsing speed.
• Adaptability: DNS servers can be readily upgraded to match changes in websit
e addresses or domain names.
• Safety: DNS servers can be used to execute safety measures such as limiting
access to malicious websites.
• Public DNS servers: These are DNS servers that are publicly available for use b
y anyone.
Google Public DNS (8.8.8.8 and 8.8.4.4) and Cloudflare DNS (1.1.1.1 and 1.0.0.1)
are two popular choices.
• Private DNS servers: These are DNS servers run by enterprises or organizations
for internal usage alone.
• Authoritative DNS servers: These are the servers that have the official IP
address information for a domain name.
By isolating various users or groups of users on the same physical network, VLAN
technology adds another layer of protection.
This guarantees that sensitive data is only accessed by authorized people and
helps prevent unauthorized access from other sources.
Collisions, which are a major concern on Ethernet networks with multiple hosts,
can cause broadcast storms.
This causes the network to completely fail or deteriorate.
When employing Layer 2 devices to connect LANs, data transfer within a LAN
may be limited.
Benefits
• Increased security: By isolating broadcast traffic to specified VLANs, you can
prevent sensitive data from being broadcast to unauthorized devices.
• Improved performance: By segmenting traffic, you can reduce network
congestion while improving overall performance for important applications.
• Simplified network management: VLANs can be used to organize devices into
logical groupings, making network management and troubleshooting easier.
• Greater flexibility: VLANs can readily added and withdrawn as needed,
making them a versatile choice for expanding networks.
Types of VLANs:
• Port-based VLANs:
These VLANs are assigned to specific switch ports.
Devices connected to these ports will be assigned to the selected VLAN automa
tically.
• IP subnet-based VLANs:
These VLANs are based on network devices' IP subnets.
Devices inside a specific IP subnet will be assigned to the designated VLAN auto
matically.
• Protocol-based VLANs:
These VLANs are based on network traffic type.
You could, for example, build a VLAN for VoIP traffic and another for data traffic.
Common uses for VLANs:
• Traffic prioritization:
VLANs can be used to prioritize traffic for key applications like VoIP or video conf
erencing.
The N-Computing Lab was designed with modern workstations, innovative softw
are
programs, and cutting-edge networking equipment in mind.
Furthermore, the lab has been meticulously constructed to encourage MIS
students' collaboration, innovation, and hands-on learning experiences. The
facility is designed to give students with a better learning environment as well as
cutting-edge technology tools for academic and research reasons.
Students have gained significant expertise in areas such as data analytics, inform
ation security, database management, and software development
thanks to the improved N-Computing Lab. This state-of-the-
art facility complements the department's mission of excellence in education
and research.
The lab contains six servers, each of which serves a distinct role in increasing
MIS students' learning and research experiences.
One server function as a DHCP server.
An additional server has been set aside for an impending ERP system, which is se
t to be live next year.
This ERP will be critical in Department Resource Planning, efficiently handling
student information, faculty details, and day-to-day activities.
Three switches, each with 24 ports, provide support for the laboratory.
Two of these are dedicated to internet input and output, one to connecting to
other ports, and the rest to device connections.
In the MIS Lab, the NComputing virtualization system uses a mix of hardware
and software to produce several virtual desktops on a single physical server.
This enables better resource usage and cost reductions.
The following is a breakdown of the implementation:
The L300 thin clients have USB ports for connecting mice and keyboards.
Users at each workstation can now interact with their virtual desktop sessions us
ing locally connected input devices.
3. Ethernet Switches:
4. Network Architecture:
• Ethernet switches are essential for controlling network traffic between thin
clients and vSpace Server 10 servers. They provide a dependable and high-
performance link between workstations and virtualized servers.
5. Workflow:
• Users at each workstation log in using the L300 thin client devices.
• The L300 thin clients connect to one of the vSpace Server 10 servers.
• The virtual desktop sessions for the associated L300 thin clients are managed
by the vSpace Server 10 hosts, giving each user a personalized and secure comp
uting environment.
Software:
• NComputing vSpace:
This program is used to create and administer virtual desktops on vSpace servers
• Operating System:
Each virtual desktop has its own operating system, which in this case is
Windows 10.Applications are installed on the vSpace servers and made available
to users via their virtual desktops.
Implementation Process
1. Set up the vSpace servers with vSpace software.
2. Set up the vSpace servers to generate virtual desktops.
For each virtual desktop, this includes selecting the operating system, apps, and
resources (CPU, RAM, disk space).
3. Use the Ethernet switch to connect the L300 clients to the vSpace servers.
4. Download and install the L300 client software on each L300 client.
5. Set up the L300 clients to communicate with the vSpace servers.
The MIS NComputing Laboratory is a flagship facility that embodies the department's
mission to give students access to state-of-the-art resources and capabilities.
The fusion of cuttingedge infrastructure, specialized servers, and networking
technologies fosters an atmosphere that is ideal for promoting excellence in research
and teaching.
The lab stays at the forefront of technological education in the field of Management
Information Systems as it develops further with the inclusion of an ERP system and
continuous improvements.