Download as pdf or txt
Download as pdf or txt
You are on page 1of 134

INTERNATIONAL SCHOOL OF

Networking Assignment | first semester


MANAGEMENT & TECHNOLOGY

ASSIGNMENT COVER SHEET

STUDENT DETAILS

Student ID Reg No.

Family Name Thapa Given Name Sajan

Enrolment Year 2021 Section A

Semester 1st Email sajanthapa@ismt.edu.np

SAJAN THAPA | SECTION A

1
Networking Assignment | first semester

UNIT DETAILS

Unit Title Unit 2: Networking Unit Code H/615/1619

Assessor Name Rohan Kumar Issued Date 4th August, 2021

Assignment Title Bank Network System

Assignment No 1/1 Submission Date 4th October,


2021

Qualification BTEC HND IN Campus


COMPUTING

STUDENT ASSESSMENT SUBMISSION AND DECLARATION


When submitting evidence for assessment, each student must sign a declaration confirming that the work is their
own.

Student Name Sajan Thapa Assessor Name Rohan Kumar


Issue Date 4th August, 2021 Submission Date 4th October, 2021
Programmed
Unit Name Unit 2: Networking
Assignment Title Bank Network System

Plagiarism

Plagiarism is a particular form of cheating. Plagiarism must be avoided at all costs and students who break the rules,
however innocently, may be penalized. It is your responsibility to ensure that you understand correct referencing
SAJAN THAPA | SECTION A

2
Networking Assignment | first semester
practices. As a university level student, you are expected to use appropriate references throughout and keep carefully
detailed notes of all your sources of materials for material you have used in your work, including any material
downloaded from the Internet. Please consult the relevant unit lecturer or your course tutor if you need any further
advice.

Student Declaration

I certify that the assignment submission is entirely my own work and I fully understand
the consequences of plagiarism. I understand that making a false declaration is a form of
malpractice.

Student signature: Date:

Pearson Education 2018


Higher Education Qualifications

SAJAN THAPA | SECTION A

3
Networking Assignment | first semester
Your manager has given you the task of preparing a report on the concepts related to networking principles
and topology, devices and their operating principles and proposing a topology that will be suitable for the
scenario. You will need to include some elements of theory:

1. A discussion of the various benefits and constraints relating to different network types and standards. 2.
An explanation of the impact different network topologies have on communication and bandwidth
requirements. You could also include a brief comparison of common networking principles and explain
how protocols enable the effectiveness of networked systems. You also need to explore the various
networking devices and their operating principles.

● You will need to produce a discussion of the operating principles of the main networking devices and
server types and relate this to the interdependence of workstation hardware to the appropriate networking
software.

SAJAN THAPA | SECTION A

4
Networking Assignment | first semester

Overall table of Contents

Executive summary....................................................................................................................... 16

Scope ............................................................................................................................................. 16

Objective ....................................................................................................................................... 17

Introduction ................................................................................................................................... 18

Computer network ........................................................................................................................ 19

Physical network ........................................................................................................................... 19

Personal Area Network (PAN) ................................................................................................................... 19

Local Area Network (LAN) ........................................................................................................................ 20

Metropolitan Area Network (MAN) ........................................................................................................... 21

Wide Area Network (WAN) ....................................................................................................................... 22

Campus Area Network (CAN) .................................................................................................................... 23

Logical network ............................................................................................................................ 24

Client to server ............................................................................................................................................ 24

Peer to peer network ................................................................................................................................... 27

Cloud computing........................................................................................................................... 29

Cluster computing ......................................................................................................................... 30

Distributed computing .................................................................................................................. 31

Open Systems Interconnection model (OSI model) ..................................................................... 33


SAJAN THAPA | SECTION A

5
Networking Assignment | first semester

IEEE 802 Standards ...................................................................................................................... 37

Comparison between OSI model and TCP/IP. ............................................................................. 38

Network protocol .......................................................................................................................... 39

OSI model ..................................................................................................................................... 39

DHCP (Dynamic Host Control Protocol): .................................................................................................. 40

DNS (Domain Name System protocol): ..................................................................................................... 41

FTP (File Transfer Protocol):...................................................................................................................... 41

HTTP (Hyper Text Transfer Protocol): ...................................................................................................... 41

SMTP (Simple Mail Transfer Protocol)...................................................................................................... 41

Telnet: Terminal Emulation Protocol ......................................................................................................... 41

Network topology requirement for NIC Asia bank ...................................................................... 42

Network topology ......................................................................................................................... 42

star topology................................................................................................................................................ 43

Ring topology.............................................................................................................................................. 44

Bus topology ............................................................................................................................................... 45

Mesh topology ............................................................................................................................................ 46

Hybrid topology .......................................................................................................................................... 47

Communication requirement ........................................................................................................ 49

Guided media ................................................................................................................................ 49

Twisted pair ........................................................................................................................................ 49

Unshielded twisted pair (UTP) ........................................................................................................... 50


SAJAN THAPA | SECTION A

6
Networking Assignment | first semester
Shielded twisted pair ........................................................................................................................... 51

Coaxial cable............................................................................................................................................... 51

Fiber optics cable ........................................................................................................................................ 53

Unguided media ............................................................................................................................ 54

Radio waves ................................................................................................................................................ 54

Microwaves:................................................................................................................................................ 55

Terrestrial microwaves transmission .................................................................................................. 56

Satellite microwaves transmission ...................................................................................................... 56

Infrared........................................................................................................................................................ 57

Bandwidth management.................................................................Error! Bookmark not defined.

Networking devices ...................................................................................................................... 60

Requirement ................................................................................................................................................ 60

Router.......................................................................................................................................................... 61

Switch ......................................................................................................................................................... 62

Wi-fi devices ............................................................................................................................................... 63

Repeater ...................................................................................................................................................... 63

Modem .......................................................................................................................................... 64

Hub.............................................................................................................................................................. 64

VPN (Virtual Private Network) .................................................................................................................. 65

Workstation ................................................................................................................................................. 66

Server ............................................................................................................................................ 66

SAJAN THAPA | SECTION A

7
Networking Assignment | first semester

Physical server .............................................................................................................................. 66

Tower server ............................................................................................................................................... 67

Rack server.................................................................................................................................................. 68

Blade server ................................................................................................................................................ 69

Dell PowerEdge R830 Rack Server ............................................................................................................ 70

Logical server................................................................................................................................ 71

File server............................................................................................................................................ 71

DNS server .................................................................................................................................................. 72

Mail server .................................................................................................................................................. 72

DHCP server ............................................................................................................................................... 72

Interdependence of workstation hardware with relevant networking software. ........................... 73

Client operating system............................................................................................................................... 73

Sever operating system ............................................................................................................................... 74

Client software ............................................................................................................................................ 75

Server software ........................................................................................................................................... 75

Conclusion .................................................................................................................................... 76

Network system overview............................................................................................................. 77

Physical design.............................................................................................................................. 78

Subnetting table ............................................................................................................................ 79

Device requirement ....................................................................................................................... 80

Install and configure network services and applications on your choice. ..................................... 80
SAJAN THAPA | SECTION A

8
Networking Assignment | first semester

Test and evaluate the design to meet the requirements and analyze user feedback with the aim of
improving efficiency. .................................................................................................................... 97

Test log: ...................................................................................................................................... 101

Maintenance schedule to support the networked system. ........................................................... 102

Gann chart for network schedule: ............................................................................................... 102

Backup ........................................................................................................................................ 103

Upgrade: ...................................................................................................................................... 104

Security: ...................................................................................................................................... 104

Troubleshooting: ......................................................................................................................... 104

Network implementation ............................................................................................................ 105

IP configuration ........................................................................................................................................ 105

DHCP ........................................................................................................................................................ 105

IP route ...................................................................................................................................................... 106

Password ................................................................................................................................................... 106

Enable secrete ........................................................................................................................................... 107

DNS .......................................................................................................................................................... 109

HTTPS ...................................................................................................................................................... 110

Email ......................................................................................................................................................... 112

Recommendation for potential enhancement for the network system ........................................ 113

Document and analyze test results against expected results. ...................................................... 115

SAJAN THAPA | SECTION A

9
Networking Assignment | first semester

Use critical reflection to evaluate own work and justify valid conclusions. .............................. 128

Conclusion .................................................................................................................................. 129

SAJAN THAPA | SECTION A

10
Networking Assignment | first semester

NIC ASIA BANK PVT LTD

Report on network protocols and architecture

Date of submission: 04-10-2021

SAJAN THAPA | SECTION A

11
Networking Assignment | first semester

Submitted by:
Submitted to:
Sajan Thapa
Manager, NIC Asia bank
IT officer, NIC Asia bank ltd Kathmandu

Table of content part 1

Executive summary....................................................................................................................... 16

Scope ............................................................................................................................................. 16

Objective ....................................................................................................................................... 17

Introduction ................................................................................................................................... 18

Computer network ........................................................................................................................ 19

Physical network ........................................................................................................................... 19

Personal Area Network (PAN) ................................................................................................................... 19

Local Area Network (LAN) ........................................................................................................................ 20

Metropolitan Area Network (MAN) ........................................................................................................... 21

Wide Area Network (WAN) ....................................................................................................................... 22

Campus Area Network (CAN) .................................................................................................................... 23

Logical network ............................................................................................................................ 24

Client to server ............................................................................................................................................ 24

Peer to peer network ................................................................................................................................... 27

SAJAN THAPA | SECTION A

12
Networking Assignment | first semester

Cloud computing........................................................................................................................... 29

Cluster computing ......................................................................................................................... 30

Distributed computing .................................................................................................................. 31

Open Systems Interconnection model (OSI model) ..................................................................... 33

IEEE 802 Standards ...................................................................................................................... 37

Comparison between OSI model and TCP/IP. ............................................................................. 38

Network protocol .......................................................................................................................... 39

OSI model ..................................................................................................................................... 39

DHCP (Dynamic Host Control Protocol): .................................................................................................. 40

DNS (Domain Name System protocol): ..................................................................................................... 41

FTP (File Transfer Protocol):...................................................................................................................... 41

HTTP (Hyper Text Transfer Protocol): ...................................................................................................... 41

SMTP (Simple Mail Transfer Protocol)...................................................................................................... 41

Telnet: Terminal Emulation Protocol ......................................................................................................... 41

Network topology requirement for NIC Asia bank ...................................................................... 42

Network topology ......................................................................................................................... 42

star topology................................................................................................................................................ 43

Ring topology.............................................................................................................................................. 44

Bus topology ............................................................................................................................................... 45

Mesh topology ............................................................................................................................................ 46

SAJAN THAPA | SECTION A

13
Networking Assignment | first semester
Hybrid topology .......................................................................................................................................... 47

Communication requirement ........................................................................................................ 49

Guided media ................................................................................................................................ 49

Twisted pair ........................................................................................................................................ 49

Unshielded twisted pair (UTP) ........................................................................................................... 50

Shielded twisted pair ........................................................................................................................... 51

Coaxial cable............................................................................................................................................... 51

Fiber optics cable ........................................................................................................................................ 53

Unguided media ............................................................................................................................ 54

Radio waves ................................................................................................................................................ 54

Microwaves:................................................................................................................................................ 55

Terrestrial microwaves transmission .................................................................................................. 56

Satellite microwaves transmission ...................................................................................................... 56

Infrared........................................................................................................................................................ 57

Bandwidth management.................................................................Error! Bookmark not defined.

Networking devices ...................................................................................................................... 60

Requirement ................................................................................................................................................ 60

Router.......................................................................................................................................................... 61

Switch ......................................................................................................................................................... 62

Wi-fi devices ............................................................................................................................................... 63

Repeater ...................................................................................................................................................... 63

Modem .......................................................................................................................................... 64
SAJAN THAPA | SECTION A

14
Networking Assignment | first semester
Hub.............................................................................................................................................................. 64

VPN (Virtual Private Network) .................................................................................................................. 65

Workstation ................................................................................................................................................. 66

Server ............................................................................................................................................ 66

Physical server .............................................................................................................................. 66

Tower server ............................................................................................................................................... 67

Rack server.................................................................................................................................................. 68

Blade server ................................................................................................................................................ 69

Dell PowerEdge R830 Rack Server ............................................................................................................ 70

Logical server................................................................................................................................ 71

File server............................................................................................................................................ 71

DNS server .................................................................................................................................................. 72

Mail server .................................................................................................................................................. 72

DHCP server ............................................................................................................................................... 72

Interdependence of workstation hardware with relevant networking software. ........................... 73

Client operating system............................................................................................................................... 73

Sever operating system ............................................................................................................................... 74

Client software ............................................................................................................................................ 75

Server software ........................................................................................................................................... 75

Conclusion .................................................................................................................................... 76

SAJAN THAPA | SECTION A

15
Networking Assignment | first semester

Executive summary
The Following report is intended for the NIC Asia bank. NIC Asia Bank is a reputed and well
managed bank in Nepal. The head office and corporate office of the organization is located in
Kathmandu. It has a total of 77 branches all over Nepal. The organization has recently made a
decision of opening a new branch in Gauradaha. I am hired as an It officer of the company. Being
an IT officer of NIC Asia bank, my duty is to analyze the network and create configuration as per
the requirement. This report consists of discussion of different network types, network topologies,
network standards and network protocols. I will describe each type of them with their advantages
and disadvantages and explain briefly why I choose a particular type and why it will be best for
the company. then this report includes discussion of network devices, their functions and why they
are needed to build the network system of this company. finally, this report includes different
aspects of server selection, software and hardware selection with their performance analysis of
network.

Scope
This report will provide a clear view of different network types, network topologies, network standards,
network protocols. This report will provide information about the different hardware devices and software
required for designing the network system of the NIC Asia bank. This report will also provide comparison
between different network standards, server and network topologies.

SAJAN THAPA | SECTION A

16
Networking Assignment | first semester

Objective
The following are some important objectives of the report.

• To provide a clarification about different network topologies, network standards, protocols and
servers and choose the best for the company.

• To build a secure network system for the NIC Asia bank.

• To make a reliable network system.

• To automate the network system.

SAJAN THAPA | SECTION A

17
Networking Assignment | first semester

Introduction

As an IT officer in NIC Asia bank, here I will provide discussion over the protocols, network types
including physical network and logical network. I want to provide the evaluation over the topology
and standards that will be used inside my bank network development. Here, I am going to discuss
and select the range of server and may include physical server and logical to develop the relation
between bank and the customer with strong technical support.

All the department has its own responsibilities and also it has its own infrastructures. First IT
department is core department which manage, configure and use to maintain which include
management of network system, configuration of server and network planning etc. moving on,
finance department is responsible for finance planning of bank, HR department is to manage and
optimize work force, Management department is in-charge of operational management and last
account department is in-charge of handling all the account of bank.

Being a IT for NIC Asia bank, I have to create a new design plan, manage, setup and optimize
the network system so that it could meet the requirements for every departments. Also, I have to
consider IP addressing, manage server system, network devices and security devices so that it
will be easy to transfer the data without any fear of losing it or getting stolen.

SAJAN THAPA | SECTION A

18
Networking Assignment | first semester

Discuss the benefits and constraints of different network types and standards.

Computer network
Computer network is the connection of two or more than two computers or devices in order to
communicate and share data electronically. (computer network | Definition & Types (2021).)

Computer network is categorized into two types. i.e. physical network and logical network.

Physical network
Physical network is categorized on the basis of the range or geographical area that a network cover.

Personal Area Network (PAN)

PAN is the smallest network among all the other networks. It is typically used for personal purpose.
It covers a range of about 10 meters. It can be used in small offices and residences. PAN is
composed of wireless MODEM, a computer, a mobile phone, printers etc. (Overview of Personal
Area Network (PAN) - GeeksforGeeks (2020))

Advantages:

• Using PAN, we can get rid of extra cables and wires.

• It is efficient and convenient.

• It is portable

• It is affordable and cost-effective.

Disadvantages:

SAJAN THAPA | SECTION A

19
Networking Assignment | first semester

• It can only be operated in small area range (within 10 meters).

• Use of PAN can interfere with radio signals.

• Data transfer rate is very slow.

• It uses infrared signal which can travel merely travel in straight line.

Local Area Network (LAN)

LAN is one of the most used and discussed network. It is also one of the most common networks.
In LAN, groups of computers are connected within a short distance (within a building) to share
information and resources. It uses topologies like: bus topology, ring topology etc. to connect
devices. LAN can be connected to WAN by use of routers to increase speed of the data transfer.
(Types of Computer Network: What is LAN, MAN and WAN (2021))

Advantages:

• It enables resource sharing (printers, scanners etc.) which helps to reduce expenses on extra
hardware.

• In LAN, one computer of the network can easily share information and messages with
another.

• As server computer stores all data, it is easy to manage and is more secure.

• It helps computers if the network to share software applications, so it is not necessary to


purchase a licensed application separately for each computer.

Disadvantages:
SAJAN THAPA | SECTION A

20
Networking Assignment | first semester

• Network devices such as routers, ethernet cable, hub, switches are required for its
installation which is costly.

• It covers limited area like an office, a building or few nearby buildings.

• Expert like LAN administrator is needed for its installation and management.

• Data can be stolen by an unauthorized person if server hard disk is not properly secured.

Metropolitan Area Network (MAN)

MAN is an interconnection of different LANs which covers a larger geographical area such as a
city or town. In MAN, LANs are interconnected to each other by telephone exchange line. It covers
larger ranger than that of LAN. Military uses MAN for communication purposes. Its ownership
and management are handled by a person or a company. (Types of Computer Network: What is LAN,
MAN and WAN (2021))

Advantages:

• Less resources are needed than that of WAN.

• It provides centralized management of data.

• It helps in reducing expenses as it offers resource sharing.

• It is more secured than WAN.

Disadvantages:

• Its management is hard if it grows large.

SAJAN THAPA | SECTION A

21
Networking Assignment | first semester

• It makes the system prone to hacking.

• It needs more cables for connection.

• Its installation, management requires skilled expert increasing more expense.

Wide Area Network (WAN)

Basically, WAN can be described as the networks of networks. WAN covers large geographical
area such as countries and states. Like MAN, it is also interconnection of LANs. Best example of
WAN is internet. Internet is one of the biggest WAN if the world. WAN is essential for
international businesses as well as daily use. With its use information can be shared throughout
the world. (Types of Computer Network: What is LAN, MAN and WAN (2021))

Advantages:

SAJAN THAPA | SECTION A

22
Networking Assignment | first semester

• It covers large geographical area (1000km or more). So, information and data can be
transferred within a large area.

• Data are managed in centralized way. So, purchasing emails, files and backup server is not
needed.

• It provides high bandwidth which makes data sharing faster.

• Users get updated files as software companies are always working on live server.

Disadvantages:

• All technologies are mixed together in WAN which creates mores security issues than other
networks.

• For installing WAN, we need to buy network devices such as routers, switches, hubs which
are costly.

• Data are transferred through internet which makes it prone to hacking, stealing. So it
requires antivirus software and firewall.

Campus Area Network (CAN)

SAJAN THAPA | SECTION A

23
Networking Assignment | first semester

CAN is a network created by interconnection of multiple interconnected LANs that covers a


limited geographical range. It is smaller than MAN and WAN. It is also known as corporate area
network. Students, faculty gain access to internet in campus, colleges with the help of CAN. CAN
is also used in military bases and corporate buildings. (What is a Campus Area Network (CAN)? -
Definition from Techopedia (2021))

Advantages:

• It can work wireless. Therefore, we can save expenses of extra wires, cables.

• Data sharing in CAN works on LAN, so data transferring in CAN is faster than in WAN.

• Management of CAN is done by IT experts, they can have high level of control over the
network and they can apply many security policies to secure the network.

Disadvantages:

• Limited number of nodes (up to 64 modes) can be connected in CAN.

• Its management, maintenance is costly than other networks.

Logical network
Logical network defines the way or structure in which the computers/devices of a particular
network are connected to each other.

Client to server
It is a network where end users known as client access files from a central computer known as
sever. In client to server network, client send requests or orders to the server and server responses
to the client with the data. A client does not contribute at all in this network. Client use network as

SAJAN THAPA | SECTION A

24
Networking Assignment | first semester

a medium to contact the server and send and receive information about the provided requests. For
example: when we use our computer and type facebook.com in our web browser, Then, our web
browser sends request to the Facebook server. Facebook server responds to our web browser with
some data and that data is displayed in our browser. Hence, we are using the client computer here
and Facebook is the sever computer. ((Client-Server Model - GeeksforGeeks (2019))

Fig: client-server network

SAJAN THAPA | SECTION A

25
Networking Assignment | first semester

Advantages of client to server network:

• It is more secured as data are managed in a centralized system.

• Management is easier because it is easier to locate and find files as all the data is stored in
a single location.

• Problems in any part of a network can be solved from a single location.

Disadvantages of client to server network:

• Server is very expensive to purchase

• Experts staff are required for its management

• If there are too many requests at a time, it leads to the crashing and slowing down of the
network. It is very inconvenient to access information if so happens.

SAJAN THAPA | SECTION A

26
Networking Assignment | first semester

Peer to peer network

In peer to peer network, two or more computers are connected in order to share resources and
information without being connected to a central computer(server). In this network, each device
connected to the network contribute to the network. i.e. each computer connects to this network
share part of its resources with the other devices. Every device in this network is known as peer.
An example of peer to peer network can be computers connected to LAN in an office. In LAN,
two or more devices are interconnected and share resources with each other, hence making a peer
to peer network. (What is peer-to-peer (P2P)? - Definition from WhatIs.com (2021))

Fig: peer to peer network

SAJAN THAPA | SECTION A

27
Networking Assignment | first semester

Advantages of peer to peer network:

• Network operating system is not required.

• Expert staff for its management is not needed.

• It is much easier to setup than client server network

• Malfunction in a computer of the network doesn’t disrupt other parts of the network

• Each device can function independently.

Disadvantages of peer to peer network:

• Files cannot be backed up centrally.

• There is less security or no security at all as user doesn’t need to log onto the workstations.

• Data are not managed in centralized system, so it is hard to locate files which results in
wastage of time.

SAJAN THAPA | SECTION A

28
Networking Assignment | first semester

Cloud computing

Cloud computing simply means storing and accessing data (photos, videos, texts etc.) over the
internet rather than storing and accessing it over our device’s hard drive storage. It can be
considered as a service provided a company or a person. our data on cloud is stored in a server of
a big company and we can access through the internet. Some examples of cloud computing are:
google photos, google drive, one drive, Samsung cloud etc. (What is Cloud Computing? Beginner's
Guide (2021))

Fig: cloud computing

Advantages of cloud computing:

• It is cost effective as it saves the expenses for the resources and saves our time.

• Data can be accessed from anywhere, anytime through the internet.

• Physical storage center is not required as data can be stored over the internet.

• It is easy to implement and can be easily accessed quickly and easily.

Disadvantages of cloud computing:


SAJAN THAPA | SECTION A

29
Networking Assignment | first semester

• Internet requirement is inevitable.

• Users have less control, cloud system is owned, controlled by a specific person or a
company.

• In the cloud system, we have to send our important data, files to the service provider which
means they can access it.

Cluster computing

In simple words, cluster computing refers to the combination of many computers connected to the
same network acting as a single entity to carry out a common purpose. In cluster computing, each
computer of the network is called as a node. Here, all nodes work as a single system. Typically,
computers are connected through fast LANs in cluster computing. The operation is executed by
all the computer altogether as a single system. (Cluster Computing : Definition, Types, Advantages
& Applications (2020))

Fig: cloud computing architecture


SAJAN THAPA | SECTION A

30
Networking Assignment | first semester

Advantages:

• It is cost effective.

• It can be managed with little effort and it is easy to implement.

• It has high processing due to its unified processing system.

• Its performance can be upgraded with the addition of a computer system (node).

Disadvantages:

• It is difficult to locate faults/errors.

• If there are many computers, management is very hard.

• Big physical space is required for it.

• Its power consumption rate is higher than that of a single server.

Distributed computing

Distributed computing is simply multiple software on multiple computer which works as a single
system. In distributed computing, Computers maybe physically close connected through LAN or
geographically far connected through WAN. In a distributed system, the computers are situated on
different network and send and use messages to interact with each other in order to carry out a
common goal. (Distributed Computing | Advantages and Disadvantages (2020))

SAJAN THAPA | SECTION A

31
Networking Assignment | first semester

Fig: distributed computing architecture

Advantages:

• Its performance can be boosted with the addition of a hardware (a computer system).

• It is easy to install, implement and debug.

• Due to its unified processing system, it has high processing speed.

• Fault in a node does not cause fault in any other nodes.

Disadvantages:

• Its implementation cost is very high.

• Due to its open system, each individual has the responsibility to ensure the security of their
respective computer.

• It is vulnerable to network errors which makes it inconvenient to access files.


SAJAN THAPA | SECTION A

32
Networking Assignment | first semester

Open Systems Interconnection model (OSI model)

OSI model is a conceptual model that is used to define and understand how a computer can
communicate with another over the computer network. Its helps to standardize the communication
function into a computing system regardless of its internal architecture or technology. It separates
the function of a protocol into seven layers. Each layer possesses an ability to use the function of
the layer underneath it and it merely transmits the functionality to the layer above it. Modern
internet is based on TCP/IP instead of OSI model. All seven layer of the OSI model are briefly
explained below. (What is OSI Model | 7 Layers Explained | Imperva (2021))

SAJAN THAPA | SECTION A

33
Networking Assignment | first semester

Fig: OSI model

Advantages:

• It helps as a guidance tool for developing any network model.

• Because it is a layered model, changes in one layer does not affect other layers.

• Both connectionless and connection-oriented services are supported by it.

• Every layer’s protocols can be replaced easily depending upon the network’s nature.

Disadvantages:

• It does not define a specific protocol.

• It may be difficult for OSI model to fit a new protocol.

• The layers in the OSI model are dependent upon each other, they need to wait for its
predecessor to receive data.
SAJAN THAPA | SECTION A

34
Networking Assignment | first semester

All seven layers of OSI model are as described below:

1. Physical Layer
The physical layer plays a vital role in the wireless connection or physical cable connection
between network nodes. It defines the plug, electrical cable, or wireless technology that connects
devices and is responsible for transmitting raw data, which is simply a sequence of zeros and ones,
while controlling rate of bit control. (What is OSI Model | 7 Layers Explained | Imperva (2021))

2. Data Link Layer


The data link layer helps in the establishment and eradicates a connection between two physically
linked nodes on a network. It divides packets into frames and sends them from source to
destination. Data link layer is composed of two sections: Logical Link Control (LLC), which
recognizes protocols of network, performs error checking and coincide frames, and Media Access
Control (MAC), which uses MAC addresses to link devices and claims permission to send and
receive data. (What is OSI Model | 7 Layers Explained | Imperva (2021))

3. Network Layer
There are two main functions of the network layer. One is to divide the segments into network
packets and gather the packets on the receiving side. The second is to route packets by determining
the best route through the physical network. the network layer works on network addresses, usually
internet protocol addresses for routing packets to a target node. (What is OSI Model | 7 Layers
Explained | Imperva (2021))

SAJAN THAPA | SECTION A

35
Networking Assignment | first semester

4. Transport Layer
Transport layer is the fourth layer of the OSI layer from the top. Providing communication services
directly to the application processes being run on different hosts is the main function of the
transport layer. Data transmitted in the session layer is received by the transport layer and it further
separates it into segments on the transmitting end. Transport layer rearranges the segments on the
receiving end and turns it back into data which is usable for session layer. The transport layer does
the flow manipulation, sending data at a rate that matches the device’s speed of connection, and
error control, checks whether the data was received incorrectly and if not, application layer
requests it again. (What is OSI Model | 7 Layers Explained | Imperva (2021))

5. Session Layer
The session layer generates a channel called a session for communication. Session layer holds the
responsibility for opening sessions and making sure that the session stays open and functional
during the time of data sharing, and closes it when the communication ends. The session layer may
as well as set checkpoints while data is being transferred, in case of interruption of the session,
devices can resume transferring data from the last checkpoint. (What is OSI Model | 7 Layers
Explained | Imperva (2021))

6. Presentation Layer
The Presentation layer is the sixth layer of the OSI model. Presentation layer is also called as the
translation layer because it works as a data translator in the network. presentation layer extracts
and manipulates the data which it receives from the application layer as per the needed format and
it transfers the data on the network. providing or defining the format of data and encryption is the
major function of the presentation layer. The presentation layer maintains the proper syntax of the
data that it receives or transmit to other layers. Therefore, it is also called as the syntax layer. (What
is OSI Model | 7 Layers Explained | Imperva (2021))

SAJAN THAPA | SECTION A

36
Networking Assignment | first semester

7. Application Layer
The application layer is the seventh layer of the OSI layer. The application layer is the closest one
to the end-user. So, the end-user and the application layer can communicate directly with the
software application. End-user software like web browsers, email clients etc. use the application
layer. the application layer ensures if enough network resources are present for the requested
communication. Software is provided protocols by the application layer in order to send and
receive information and provide meaningful data to the user. Simple mail transfer protocol
(SMTP), file transfer protocol (FTP), hypertext transfer protocol (HTTP), post office protocol
(POP), domain name system (DNS) are some examples of the application layer. (What is OSI
Model | 7 Layers Explained | Imperva (2021))

IEEE 802 Standards

IEEE 802 is a set of networking standards which cover specifications of data link layer and
physical layer for technologies like wireless and ethernet. These specifications are applicable to
metropolitan area networks (MAN) and local area networks (LAN). IEEE 802 standards assists to
ensure that internet services and technologies follow a set of recommended practices so network
devices can work altogether smoothly. (What are the IEEE 802 Standards? (2021))

IEEE 802.1 - it is linked to management of network

IEEE 802.2 – it is sub-divided into two parts. Logical link control (LLC) and control of access to
media (MAC).

IEEE 802.3 – it is basic standard for Ethernet.

IEEE 802.4 – it defines MAC layer for BUS network.

IEEE 802.5 – it divides MAC layer for the token ring network

IEEE 802.6 – it is linked to metropolitan area network (MAN)

SAJAN THAPA | SECTION A

37
Networking Assignment | first semester

Comparison between OSI model and TCP/IP.

OSI model TCP/IP


1. It is developed by ISO (international • It is developed by ARPANET (advance
standard organization). research project agency network).
2. OSI model provides a clear • TCP/IP doesn’t have any clear
distinction between interfaces, distinguishing points between interfaces
services and protocols. and protocols.
3. OSI header size is 5 bytes. • TCP/IP header size is 20 bytes.
4. It follows vertical approach. • It follows horizontal approach.
5. It helps to standardize router switch, • It helps to establish connection between
motherboard and other hardware. different types of computer.

Comparison between OSI model and TCP/IP

SAJAN THAPA | SECTION A

38
Networking Assignment | first semester

As per the scenario, one of the reputed and well managed bank of Nepal NIC Asia bank is going
to open a new branch in Gauradaha. As an IT officer, it is my responsibility to choose the
networking principles and protocols which is best and effective for my company NIC Asia bank.
I would choose OSI model. The OSI model consists of seven broad categories in its stack. This
makes debugging issues much easier because there are different layers in the protocol stack that
handles a specific function that’s eradicates load from the small partitions in the TCP layer. For
example, the presentation layer handles the part of the syntax configuration data, data encryption
and decryption and the session layer handles chat controls, syncing between computers. Thus, the
application crust load is reduced.

Network protocol
Network protocol is a set of rules, data structures that defines how devices over a network
communicate and share data. In simple words, network protocol is a language that the devices use
to communicate with each other regardless of their differences in design and structure.

OSI model
To understand network, protocol we need to know about the open systems interconnection (OSI)
model. Most of the network protocol’s structure are based on OSI model. The OSI model breaks
a communication process between two devices into 7 layers. These layers are assigned a task or
group of tasks. All of these layers can work independently.

The following are the function of networking protocol of each layer:

Application layer network protocols (7th layer):


SAJAN THAPA | SECTION A

39
Networking Assignment | first semester
• It provides standard services such as file transfer

Presentation layer network protocols (6th layer):

• It masks the difference in data formats between dissimilar systems and it encrypts and
decrypts data and compresses and decompresses data.

Session layer network protocols (5th layer):

• It establishes and terminates session between users

Transport layer network protocols (4th layer):

• It performs end-to-end message delivery between systems

Network layer network protocols (3rd layer):

• it manages routing between two unique network device addresses.

Data link layer network protocols (2nd layer):

• It detects and solves data transmit errors.

Physical layer network protocols (1st layer):

• It is the network medium between devices

(ManageEngine, c. (2021))

The following are some major network protocols used in network communication:

DHCP (Dynamic Host Control Protocol):


It is an application layer network protocol. DHCP is a network communication protocol that assists
in automating IP assigning in a network. In nm IP network, each device requires its own unique
IP address. DHCP helps network administrator to assign IP addresses automatically to the device
connected to the network. In other words, it manages the centralized distribution of IP addresses
within a network. (ManageEngine, c. (2021))

SAJAN THAPA | SECTION A

40
Networking Assignment | first semester

DNS (Domain Name System protocol):


DNS is an application layer network protocol. It works on client-server model. DNS protocol helps
to create a IP addresses for host names. It is very difficult to remember IP addresses. So, DNS
protocol solves this problem by converting domain name of websites into numerical IP addresses.
(ManageEngine, c. (2021))

FTP (File Transfer Protocol):


FTP helps in file sharing between hosts. It has two TCP connections for file transfer, control and
data connection. Data connection helps to share the actual data whereas control connection helps
to transfer control data like password and commands to store and retrieve files. It allows to share
large files at a same time. It also helps to continue data sharing if is was paused or interrupted.
(ManageEngine, c. (2021))

HTTP (Hyper Text Transfer Protocol):


HTTP is an application layer protocol. It works on distributed and hypermedia systems. It works
on a client-server model. Web browsers acts as a client here. Data like texts, images and other
multimedia are shared over world wide web with the help of HTTP. (ManageEngine, c. (2021))

SMTP (Simple Mail Transfer Protocol)


SMTP helps in efficient and reliable transfer of electronic mail. It is a push protocol. It is used to
send email. It transfers email between systems and notifies about incoming emails. With the help
of SMTP, clients of same network or another can send emails to each other through the gateway
access. (ManageEngine, c. (2021))

Telnet: Terminal Emulation Protocol


Telnet is an application layer protocol. It enables us to manage a remote device. Telnet is mostly
used by network administrators to manage devices of a network remotely. A network administrator
requires IP address or host name of the device and after they will get a virtual terminal through
which they can communicate with the host. (ManageEngine, c. (2021))

SAJAN THAPA | SECTION A

41
Networking Assignment | first semester

Explain the impact of network topology, Communication and bandwidth requirements.

Network topology requirement for NIC Asia bank

As an IT officer of NIC Asia bank I will explain briefly why a network topology impacts the performance
of a computer network. Network topology in a computer network helps in making a system stable. Network
topology helps to understand two vital things. One is that it helps us to understand different components of
our network and where they connect. Second one is that it shows us what can be expected from their
performance and how they interact. Network topology is important for performance management. The
layout of a computer networks impacts the functionality of a computer network directly. It determines how
the network functions. Selecting a right topology may improve performance and efficiency of data in a data
and it may also improve the troubleshooting of the errors, allocation of resources and reduce unnecessary
expenses.

Network topology

A network topology can be simply defined as a structure in which devices of a network are
connected to each other. A network topology shows how the devices linked to a same network are
connected to each other. It can also be called as a layout of a computer network. network topology
of a computer network has a direct impact on the network’s functionality. Different types of
network topologies are: (What is Network Topology? Definition and FAQs | OmniSci (2021))

• Star topology

• Ring topology

• Bus topology

• Mesh topology

• Hybrid topology
SAJAN THAPA | SECTION A

42
Networking Assignment | first semester

star topology
In a star topology, each devices of a network are connected to a central controller (hub/switch). It
doesn’t allow the devices to communicate with each other directly. Here, switch or hub act as a
server and other devices of the network act as clients. In star topology, if a device sends a data it
is transmitted to the hub/switch and it sends the data to the target device. (Computer Network
Topology - Mesh, Star, Bus, Ring and Hybrid (2019))

Advantages of star topology:

• It is easier to install.

• It requires less cable as each device need to connect to the hub only.

• It is easier to detect faults in star topology because identification of the link is easier

• There is no disruption on the network while removing and adding devices.

Disadvantages of star topology:

• The whole network goes down if the hub goes down as every device is dependent upon the
hub.

SAJAN THAPA | SECTION A

43
Networking Assignment | first semester

Ring topology
In ring topology, each device is connected to exact two other devices which forms a single
continuous pathway for signal through every device. Each device on ring topology has a repeater.
If a device wants to send a data, the data is sent in one direction and the repeater forwards it to
another device and this continues until the target device receives the data. . (Computer Network
Topology - Mesh, Star, Bus, Ring and Hybrid (2019))

Advantages of ring topology:

• It is easy to install

• The flow of data is in one direction which reduces the data collision

• The speed of data transfer between workstations is very high.

• Addition of a device doesn’t affect the performance of the network.

SAJAN THAPA | SECTION A

44
Networking Assignment | first semester

Disadvantages of ring topology:

• The whole network is affected if one workstation goes down.

• The hardware that it uses is more expensive than ethernet and hub/switch.

• To transfer a data, the data must transfer through each workstation which may affect its
speed.

Bus topology

In bus topology, each device is connected to a single cable through drop line. A coaxial cable/RJ-
45 is used to connect all devices. The cable is the backbone of the network in bus topology. It uses
a device named tap to connect the drop line to the main cable. . (Computer Network Topology -
Mesh, Star, Bus, Ring and Hybrid (2019))

Fig: Bus topology architecture

SAJAN THAPA | SECTION A

45
Networking Assignment | first semester

Advantages of bus topology:

• It is easy to install as each device needs to be connected to the main cable only.

• It requires less cables than star and mesh topology.

Disadvantages of bus topology:

• It is difficult to detect faults.

• There is a limit on how much nodes can be connected to the main cable.

Mesh topology
In the mesh topology, one device of a same network is connected to every other device of the network. It
allows the most transmission to be distributed even if one connection is not working. There are two forms
of mesh topology. They are partial mesh topology and full mesh topology. In partial mesh topology, at least
two devices are connected to multiple other devices. Whereas in full mesh topology, each device is
connected to every device of the network. (Computer Network Topology - Mesh, Star, Bus, Ring and
Hybrid (2019))

Fig: mesh topology architecture


SAJAN THAPA | SECTION A

46
Networking Assignment | first semester

Advantages of mesh topology:

• Data can be transmitted by multiple devices simultaneously. So, it can manage high
number of traffic.

• Fault in one connection doesn’t affect other connection or data transmission

• No disruption in the network is caused during the addition of devices.

Disadvantages of mesh topology:

• Its implementation cost it higher than other topologies.

• It is difficult to implement, manage and its time consumption is high.

Hybrid topology
Hybrid topology is a network topology which uses two or more topologies of different types. It can be said
that hybrid topology is just a combination of two or more type of topologies. Those topologies may include
ring topology, star topology, mesh topology, bus topology and tree topology. It is usually used in a
company, office where there are high number of computers. . (Computer Network Topology - Mesh, Star,
Bus, Ring and Hybrid (2019))

SAJAN THAPA | SECTION A

47
Networking Assignment | first semester

Fig: hybrid topology architecture

Advantages of hybrid topology:

• We can get the unified benefits of different topologies.

• It is easy to add networks and computers without causing disruption to the whole network.

• Troubleshooting and fixing error are easy.

• It can be designed as per the requirement of organizations.

Disadvantages of hybrid topology:

• Hubs used in this topology are different and expensive than that used in other topologies
because it should be able to co-operate with other topologies.

• It is very difficult to manage due to its complex nature.

• Due to its complex form, it is hard to design and build.

SAJAN THAPA | SECTION A

48
Networking Assignment | first semester

According to scenario, there are five departments in NIC Asia bank: IT department (5 computers),
Finance Planning (14 computers), HR Department (4 computers), Management Department (13
computers), Account Department (7 computers). As an IT office of NIC Asia bank of Gauradaha
branch I will choose the best topology for the company on the basis of data transmission speed,
efficiency and its functionality. I think hybrid topology would be suitable because we would want
to cause less disruption on the network system of a company which is always busy like a bank. So,
hybrid topology allows us to add a new network system or a computer system to the main network
without the need to stop the network or data transmission. Also, troubleshooting and fixing fault
is easier and maintenance of one connection can be done without creating issues to other
connections. Hybrid topology is combined of two or more types of topologies. Therefore, it can
be designed and built as per the need of the organization.

Communication requirement

Guided media
Guided media can be defined as a physical medium through which signals are transmitted. It uses
cabling system which has fixed or limited path. For examples, copper wires, fiber optic wires etc.
(Guided Transmission Media - javatpoint (2021))

Twisted pair
It is made up of a pair of separately insulated conductor wires that are twisted with each other.
Twisted pair cable is the most widely used transmission media. Its frequency ranges from 0 to
3.5Khz. There are two types of twisted pair cable, unshielded twisted pair and shielded twisted
pair. (Guided Transmission Media - javatpoint (2021))

SAJAN THAPA | SECTION A

49
Networking Assignment | first semester

Unshielded twisted pair (UTP)


It is capable of blocking interference and doesn’t require a physical shield. It is used in telephonic
purposes. (Guided Transmission Media - javatpoint (2021))

Fig: unshielded twisted pair cable

Advantages:

• It is cheap and flexible.

• It is easy to install.

• It has high speed capacity

Disadvantages:

• It has low bandwidth.

• It is less secure to interference.

SAJAN THAPA | SECTION A

50
Networking Assignment | first semester

Shielded twisted pair


It consists of a pair of conducted wires which are covered by metallic foil or braided-mesh. The
metallic covering prevents from the electro-magnetic sound penetration. (Guided Transmission
Media - javatpoint (2021))

Fig: shielded twisted pair cable

Advantages:

• It is faster than unshielded twisted pair cable.

• It eradicates crosstalk

Disadvantages:

• Comparatively, it is hard to build and install.

• It is more expensive than unshielded twisted pair cable and coaxial cable.

Coaxial cable
Coaxial cable has two conductors parallel to each other and separated by an insulator. The central
or inner most conductor is a copper wire and the second conductor that surrounds the insulator is
made up of metal foil, braid or both. The outer conductor is used as shield against electro-magnetic

SAJAN THAPA | SECTION A

51
Networking Assignment | first semester

noise and it also completes the circuit. Second conductor is also covered by an insulator. The
outermost layer of the coaxial cable is a plastic jacket/cover. Coaxial cable is of two types. One is
broadband which transmits digital signal and second is baseband that transmits analog signal.
(Types of Transmission Media - GeeksforGeeks (2018))

Fig: coaxial cable

Advantages:

• It has high bandwidth.

• It has better prevention against noise.

• It is easier to install and expand.

• It is inexpensive.

Disadvantages:

• Whole network can fail if one cable fails.

• Imperfect shield can lead to grounded loops

SAJAN THAPA | SECTION A

52
Networking Assignment | first semester

Fiber optics cable


Fiber optics cable has a glass or plastic core through signal is transmitted in the form of light by
reflection. A less dense plastic or glass surrounds the core which is known as cladding. Fiber optic
cable is capable of transmitting large volume of data. (Types of Transmission Media -
GeeksforGeeks (2018))

Fig: fiber optic cable

Advantages:

• It has capable of transmitting huge volume of data and has high bandwidth.

• It has light weight.

• It is protected against electro-magnetic interference.

Disadvantages:

SAJAN THAPA | SECTION A

53
Networking Assignment | first semester

• It is difficult to install.

• It is expensive.

• It is fragile than any other cables.

Unguided media

It is also called unbounded media or wireless. It uses electro-magnetic signals for transmission.
Physical wires aren’t used in unguided media.

Three types of signals are transmitted through unguided media:

Radio waves
Radio waves are electro-magnetic waves that can travel in all direction. They can be generated
easily and can penetrate/travel through solid objects e.g. buildings. The frequency of radio waves
is from 3KHz to 1GHz. (Types of Transmission Media - GeeksforGeeks (2018))

Fig: radio waves transmission

Advantages:

SAJAN THAPA | SECTION A

54
Networking Assignment | first semester

• They cover a large area.

• They can penetrate through wall.

• It has high signal transmission rate.

• It doesn’t require wires for data transmission.

Disadvantages:

• They can’t transmit lot data simultaneously because of its low frequency.

Microwaves:
They are electro-magnetic waves. Its wavelength shorter than radio waves. For signal transmission
through microwaves, sending and receiving antennas should be perfectly aligned with each other.
The height of the antenna is directly proportional to the distance travelled by microwaves. It covers
a range from 1GHz to 300GHz. (UnGuided Transmission Media - javatpoint (2021))

Advantages:

• It is cheaper than using cable.

• Communication on sea can be done by microwaves transmission.

Disadvantages:

• An unauthorized user can catch signal by using his own antenna.

• It is dependent upon weather. If there is rain, wind, it can cause distortion of signal.

There are two types of microwaves transmission:

SAJAN THAPA | SECTION A

55
Networking Assignment | first semester

Terrestrial microwaves transmission


It is a ground-based microwaves transmission that uses antennas for the signal transmission. It has
frequency ranges from 1GHz to 1000GHz. Antennas should be perfectly aligned with each other
for data transmission. (UnGuided Transmission Media - javatpoint (2021))

Fig: terrestrial microwaves transmission

Satellite microwaves transmission


It uses a physical object called satellite for signal transmission that revolves around the earth at a
certain height. Signals from earth station is transmitted to the satellite. Then, the satellite converts
received signals into amplified signals and it is retransmitted to the earth station. It has higher
coverage area than terrestrial microwaves transmission. (UnGuided Transmission Media -
javatpoint (2021))

SAJAN THAPA | SECTION A

56
Networking Assignment | first semester

Fig: satellite microwaves transmission

Infrared

It is widely used for short distance signal transmission. It cannot penetrate through walls. Its
frequency ranges from 300GHz to 400THz. Infrared waves are used in remote, wireless keyboard
and mouse, printers. (Types of Transmission Media - GeeksforGeeks (2018))

Advantages:

• They have high bandwidth.

• It gives better security with less interference.

Disadvantages:

SAJAN THAPA | SECTION A

57
Networking Assignment | first semester

• It is unreliable if used outside building as sun rays can interfere with infrared waves.

• It cannot go through wall.

Impact of bandwidth on a network

The amount of data that can be transferred from on network to another in a specific amount of
time is called bandwidth. As we know that different type of application will require different
types of network bandwidth levels. Every task which are completed over the network consume
bandwidth with bits per second speed. It can identify the speed of data bits flowing from one
network to another. Bandwidth is measure in Hertz (Hz) as frequency of data transfer rates is
measured in cycles per second.

There are many factors affecting bandwidth in networks such as quality of cables used to transfer
the data. Also, network bandwidth determines our network capacity and impacted by the design
of our cabling system. Optical fiber cables and laser signals are very capable of transferring large
amount of data in less amount of time. moreover, the congestion on the highway also impacts out
bandwidth for example if we send a packet from computer A to computer B which are located in
different place then out packet will travel from one node to another and also gets redirected to
many multiple nodes and gets queued and Ultimately this leads to delays in packets to reach
destination and hamper our bandwidth. Cables and its bandwidth are listed below:

SAJAN THAPA | SECTION A

58
Networking Assignment | first semester

standard speed Physical Logical Media Access method


topology topology

802.3 10Mbps Bus and star Coaxial and CSMA/CD


twisted pair

802.3u 100Mbps Star bus Twisted pair CSMA/CD

802.3z 1000Mbps Star Bus Twisted pair token

802.5 4Mbps and Star Ring Twisted pair Token passing


16Mbps

802.1 lb 11 Mbps Wireless Bus Radio waves CSMA/CD

FDDI 100Mbps Dual ring Ring Fiber optic, Token passing


twisted
pair/CDDI

SAJAN THAPA | SECTION A

59
Networking Assignment | first semester

Networking devices
Networking devices are those devices that are used to connect electronic devices like computer,
printer and many other electronic devices to a network in order to communicate and share
resources with other devices. They can transmit data in a fast and secure way over a same or
different network. some networking devices are in-built in a device like NIC card, RJ-45 connector
while some devices like Router, switch, hub are a part of the network.

Requirement
Networking devices are compulsory for building any network. without networking devices, data
sharing between devices is impossible. In a computer network, every network device has a key
role to complete and make a network functional. To make different device communicate and
transfer data, we need different networking devices to interconnect different electronic devices
like computers, fax machines.

I am going to list some networking devices that I need to build my network. they are:

• Router

• Switch

• Repeater

• Hub

• Modem

SAJAN THAPA | SECTION A

60
Networking Assignment | first semester

Router
Router is a networking device that connects two or more packet- switched network. it is used to
connect LAN to the internet. It has multiple interfaces that helps it to receive data packets through
them. (Computer Networking Devices Explained with Function (2021))

Fig: router

Functions:

• Addressing packets and calculate which interface to forward the packet to.

• To allow different devices to use the same internet.

In my company (NIC Asia bank, Gauradaha branch), there are 5 departments with multiple
computers in each. So, I want the devices to connect to the internet and connect to each other. And
router also helps to create local networks which are useful to share files and software tools among
the employees.

SAJAN THAPA | SECTION A

61
Networking Assignment | first semester

Switch
This networking device uses twisted pair cable to connect multiple devices to ethernet network. It
receives, stores and forwards packet using packet switching method. It keeps an update table/list
of whether packets are transferred or not. (Network Devices (2021))

Fig: switch

Functions:

• To connect multiple devices to a network.

• To forward message to the correct destination.

• To manage traffic in a network

I need switch in my network to connect multiple devices like computers, printers, servers on the
same network and to enable devices to communicate with each other and share information.

SAJAN THAPA | SECTION A

62
Networking Assignment | first semester

Wi-fi devices
Those devices that can interface with the internet through wireless networking technology called
wi-fi (wireless fidelity) are known as wi-fi devices. Some examples of wi-fi devices are, mobile
phones, laptops, wireless printers and cameras etc. In wi-fi, internet connectivity occurs through a
wireless router. (Services, P. (2021)

Wi-fi connection is important in my network because employees and customers need to connect
their mobiles phone to the internet. employees can also connect their laptop to internet without
having to connect it through an ethernet cable.

Repeater
A repeater is a networking device that retransmits an incoming signal after regenerating or
amplifying those signals. It consists of two port. It operates on the physical layer of the OSI model.
(Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter) -
GeeksforGeeks (2015))

Fig: repeater

Function:

• To regenerate signals on same network before signals becomes weak or damaged.


SAJAN THAPA | SECTION A

63
Networking Assignment | first semester

Modem
Modem is a networking device that is connected to the telephone line to connect computer to the
internet. A modem is a combination of a modulator and a demodulator. Modulator converts digital
signal into analog and demodulator converts analog signal into digital signal. (Network
Devices (2021))

Fig: modem

Function:

Its main function is to modulate incoming analog signal from our ISP (internet service provider)
into digital signal that our router translates and distribute it to the devices and demodulate digital
signal from our computer into analog signals that can be transmitted over telephone line.

Hub
This networking device is a centralized device that connects multiple devices in a single LAN. It
is a physical layer networking device. When a computer sends signals/data to the hub, It transmits

SAJAN THAPA | SECTION A

64
Networking Assignment | first semester

the incoming data/signal to the all remaining computers connected to it without regard of if the
data is destined for the device. (Network Devices (Hub, Repeater, Bridge, Switch, Router,
Gateways and Brouter) - GeeksforGeeks (2015))

Fig: hub

Function:

• To connect multiple computers in a LAN.

VPN (Virtual Private Network)


VPN hides IP address by letting network redirect through specially configured network created by
a VPN host. It means if we use internet with VPN, our ISP and other third parties cannot see the
websites we visit and data we shared across the network.

I need VPN in my network to provide safe encryption. This will help to secure our online activities
from hackers.

SAJAN THAPA | SECTION A

65
Networking Assignment | first semester

Workstation
A workstation is a computer designed with more powerful CPU and GPU than a regular personal
computer. It is a single-user computer. It consists of high memory, power hard disk and has high
graphic performance. It is usually used for intensive tasks like graphic designing, rendering, video
editing. (workstation | Definition & Facts (2021))

Function:

To perform heavy tasks smoothly, effectively and conveniently than normal personal computers.

Server
A server can be defined as a hardware device or software that provides services to other computers
called clients over network (either LAN or WAN). It responds to the requests made by clients over
the network.

Sever plays a vital role in providing resources needed over a network. files and data are stored in
a server centrally. So, users can access files easily whenever they need. A server provides powerful
processing. It stores large volume of data, freeing up memory space from each individual computer
and allowing them to perform better. (server | Definition, Examples, & Facts (2021))

Sever is categorized into two types: physical server and logical server

Physical server
Physical servers are powerful computers that is used as data center and provide services to other
computers over a network. There are three types of physical servers:

1. Tower server

2. Rack server
SAJAN THAPA | SECTION A

66
Networking Assignment | first semester

3. Blade server

Tower server
Tower servers are the most basic and cheapest servers. Its appearance is pretty similar to that of a
normal desktop CPU, but its size is comparatively bigger than normal desktop CPU. Tower servers
can’t be stacked over one another. So, a large number of tower servers can occupy a large space.
It doesn’t consist advanced graphics cards, dedicated cooling fan, dedicated higher memory. They
are added separately as per the requirement of an organization. It is suitable for organizations that
need less than four servers. (Blade Servers vs Rack Servers vs Tower Servers |
ServerWatch (2020))

Advantages of tower server:

• Its maintenance is easier. New servers or device can be added to it without disrupting the
entire server.

• There is no need to turn off the server system while repairing it.

Disadvantages of tower server:

• If there are many tower servers working together.

• Cabling is a difficult task if there are many tower servers together.

SAJAN THAPA | SECTION A

67
Networking Assignment | first semester

Rack server
In Rack server, servers are vertically stacked upon each other inside a rack. Rack server is also
known as rack-mounted server. Structure of server rack is designed in a way that each server slide
in and out with ease. They consume comparatively very less space than tower server on the basis
of number of servers. Server rack may contain cables, cable management bar, patch panels,
supporting equipment, router/switch. The unit of measurement of rack server is done in rack unit
(U or RU). One U is equal to 1.75 inches (44.45mm). The most common standard server rack
width is 19 inches. It is suitable for company that uses less than 25 servers. . (Blade Servers vs
Rack Servers vs Tower Servers | ServerWatch (2020))

Advantages:

• Cable management is easy even if there are many servers.

• Maintenance cost for rack server is low as compared to same quantity of tower server.

• One server can be repaired without having to turn off the entire server.

Disadvantages:

• If the population of servers is dense, more cooling unit is need. More energy cost is needed.

SAJAN THAPA | SECTION A

68
Networking Assignment | first semester

Blade server
Blade server is made up of chassis that encloses modular thin circuit boards called server blade.
Blade server can also be called as advanced version of rack server. The server consists of CPU,
memory, integrated network controllers and some built-in storage devices. It gets other necessary
components from the server chassis. It is suitable for organizations that use up to 40 servers. (Blade
Servers vs Rack Servers vs Tower Servers | ServerWatch (2020))

Advantages of blade server.

• Server chassis provides power supply to multiple blades instead of providing power and
cooling several racks.

• It occupies less space than rack server.

• Its structure makes centralized system, load balancing and maintenance easier.

Disadvantages of blade server:

• They are expensive.

• Dense population of blade server produces tremendous amount of heat. So, they need more
cooling unit which requires more energy supply leading to more energy expenses.

SAJAN THAPA | SECTION A

69
Networking Assignment | first semester

As per the scenario, there are 5 department in NIC Asia bank, Gauradaha branch: IT department,
finance planning department, HR department, management department and account department
with 5 computers, 14 computers, 4 computers, 13 computers and 7 computers respectively. Among
the three servers discussed above (tower server, rack server and blade server), I think rack server
will be the most suitable and benefitable one. I don’t think high quantity of servers (more than 25)
will be needed for a company like bank. In this case, the rack server fits perfectly. It comes at
lower cost than blade server. Due to its stackable structure inside a rack, it occupies less space and
fits many servers. Cable management is easy even is the servers are densely populated. Servers
can be added and maintenance can be done without disrupting the entire server.

Dell PowerEdge R830 Rack Server

SAJAN THAPA | SECTION A

70
Networking Assignment | first semester

Specifications:

Logical server
Some logical servers are described below:

File server
It manages requests from clients for files stored on the server’s local disk. A central file server
allows users to share and access data in multiple ways.

SAJAN THAPA | SECTION A

71
Networking Assignment | first semester

DNS server
DNS (Domain Name System) server is an inter-wide distributed database system that documents
and distributes network specific information such as the associated IP address for a host name and
vise-versa.

In my network, I need DNS server in order to assign IP address to the computers connected to the
network automatically.

Mail server
It is the most efficient way to receive and store electronic mail messages for a community user. A
central mail server runs 24 hours a day. It can also provide global email directory for all community
and organization’s users as well as email gateway and relay service for all mail servers.

The employees of NIC Asia bank need to send mails to each other on the network, so mail server
is needed.

DHCP server
DHCP dynamically assigns IP address, default gateway and other data to each client devices on
the network. It assigns a unique dynamic IP address for each client.

In my network, I need DNS server in order to assign IP address to the computers connected to the
network automatically.

SAJAN THAPA | SECTION A

72
Networking Assignment | first semester

Interdependence of workstation hardware with relevant networking software.

NIC Asia bank is opening a new branch in Gauradaha and I have been assigned as the IT officer
in the IT department. As an IT officer my responsibilities are to Plan, manage, design, implement
and optimize the network system for the organization considering IP addressing, Server System,
various other services, Network devices, Security devices etc. for this I will illustrate
interdependence of workstation hardware with relevant networking software which are suitable
for the bank.

As per the requirement of the bank, I have selected various hardware and computer system required
for the bank.

Client operating system


It is the operating system that is operated in desktop computers and several portable devices. They
are designed to support one user. (Client Operating (OS) System Technology - IT Training &
Certification - Infoventure Technologies (2021))

Hardware/Software dependency
OS- windows 10 We can’t get GUI (graphical user interface)
without an operating system.
RAM-8GB RAM is necessary for higher data efficiency
and fast processing.
Graphics-1GB For fast transferring, using and creating
multimedia files, graphics is necessary.
Processor-Intel i7 Processor is the main part of computer system
that processes the data/instruction.

SAJAN THAPA | SECTION A

73
Networking Assignment | first semester

Connectivity- 2XUSB 2.0 This is required to connect CPU with external


devices.
Firewall- Sophos XG firewall Firewall is required to secure network from
viruses and malware.
Network- 1000 Ethernet LAN To connect to LAN and internet, NIC card and
ethernet port is compulsory.

Sever operating system


A server operating system is specially designed to be installed and run on a server computer. It is
an advanced type of operating system that possess features that are needed within a client-server
architecture and serve requests of clients. (What is A Server Operating System? |
Webopedia (2014))

Hardware/software dependency
OS- windows server 2016 We can’t get GUI (graphical user interface)
without an operating system.
RAM- 64 GB RAM is necessary for higher data efficiency
and fast processing.
Graphics-16 GB For fast transferring, using and creating
multimedia files, graphics is necessary.
Processor- Processor is the main part of computer
system that processes the data/instruction.

Connectivity- This is required to connect CPU with external


devices.
Firewall- Firewall is required to secure network from
viruses and malware.

SAJAN THAPA | SECTION A

74
Networking Assignment | first semester

Network- To connect to LAN and internet, NIC card


and ethernet port is compulsory.

Client software
Client software is certain software applications installed in our computer that is used to
communicate to the piece of software over a network. It is used by client to connect and
communicate to the computer hardware / server. for example: Netware, Firewall, RDP protocol.

Firewall is a software that protects from an unauthorized access to a network. it uses set of rules
in a network traffic to identify and block threats.

RDP (remote desktop protocol) is developed by Microsoft that provides a graphical user interface
to a user to connect to another computer over a network.

NetWare is a network operating system that provides networking services to network users like
data accessing, security and resource management.

Server software
Server software are built to be operated on a server computer. It is a software designed to interact
with the hardware like, processor, memory, storage, input/output and communication ports. As we
know server hardware is powerful or high-end. So, server software is used to harness its computing
power.

SAJAN THAPA | SECTION A

75
Networking Assignment | first semester

Conclusion
NIC Asia bank ltd hired me as their IT officer and I was given the task by the manager of preparing
a report on the concepts related to networking principles and topology, devices and their operating
principles and proposing a topology that will be suitable for the scenario. so, firstly I discussed
about the benefits and constraints of different network types and standards. Then, the impact of
network topology, Communication and bandwidth requirements, compared common networking
principles and how protocols enable the effectiveness of networked systems, chose a network
topology and evaluated it. I also described briefly about networking devices required for creating
network for the bank and discussed about servers and chose a server for the network of the
company. At last, I discussed the inter-dependence of workstation hardware with relevant
networking software and performance optimization.

SAJAN THAPA | SECTION A

76
Networking Assignment | first semester

Design a networked system to meet a given specification scenario and network


design brief.

Network system overview

As an IT officer of NIC Asia bank, it is my responsibility to design a network that meets the
requirements of the scenario. I have already discussed about networking devices that is required
for the network system of NIC Asia bank. It is my duty to build a secure and reliable network
system for NIC Asia bank.

I am going to design a network system using Visio tool. After that, I will implement the design in
the cisco packet tracer. I will use one router and one switch for each department. I will do all the
necessary configurations like IP configuration, IP routing etc. then I will provide DHCP server to
assign IP address to each PC automatically. I will manage mail server, FTP server, DNS server
and HTTP server.

SAJAN THAPA | SECTION A

77
Networking Assignment | first semester

Physical design

SAJAN THAPA | SECTION A

78
Networking Assignment | first semester

The diagram above is the physical network design for the network I am going to design for the
NIC Asia bank PVT LTD. There are five departments: IT department, HR department,
management department, Finance department and account department. The diagram shows three
computers in each department but we will be using five computers in IT department, fourteen
computers in Finance department, thirteen computers in management department, four in HR
department and seven computers in account department. I have taken five routers (one for each
department) and five switches (one for each department) for the network. each pc of all
departments is connected to their respective switches and each switch are connected to their
respective routers. The routers are connected to each other in a loop form. i.e. every router is
connected to two routers. I have managed two servers in IT department where DNS, SMTP,
DHCP, FTP will be configured.

Subnetting table

Department Number Network ID Usual IP Broadcast ID Subnet mask


name of
computer
s
HR branch 4 192.168.10.0 192.168.10.1- 192.168.10.7 255.255.255.24
192.168.10.6 8
IT 5 192.168.10.8 192.168.10.9- 192.168.10.1 255.255.255.24
department 192.168.10.14 5 8
Account 7 192.168.10.1 192.168.10.17 192.168.10.3 255.255.255.24
department 6 - 1 0
192.168.10.30
Managemen 13 192.168.10.3 192.168.10.33 192.168.10.6 255.255.255.22
t department 2 -192.168.10. 3 4

SAJAN THAPA | SECTION A

79
Networking Assignment | first semester

Finance 14 192.168.10.6 192.168.10.65 192.168.10.9 255.255.255.19


department 4 - 5 2
192.168.10.94

Device requirement

S.NO Devices No. of devices cost description

1. Router 1941 5 3.0Lakhs rupees * For outer


5 connection.
2. Switch 2900 7 7.0 lakhs rupees * To create LAN.
7
3. Server 2012 1

4. firewall 5 55 thousand * 5 To secure the


network.
5. RJ-45 2 90 thousand * 2 To connect
computers over
an ethernet
connection.

Install and configure network services and applications on your choice.

Overview

I recently completed a network design for NIC Asia Bank. To do this operation, I have created a
network on VMware workstation and installed the ADDC server and client server. I'm going to set
SAJAN THAPA | SECTION A

80
Networking Assignment | first semester

them up and link them. I've included a screenshot of the server. I've attached a snapshot of the
server installation and configuration procedure below:

As there is no configuration of the server, we are going to configure the server.

SAJAN THAPA | SECTION A

81
Networking Assignment | first semester

There is no service. So, I am going to add roles and feature.

SAJAN THAPA | SECTION A

82
Networking Assignment | first semester

As the service is not available, I am going to add the active directory domain services.

SAJAN THAPA | SECTION A

83
Networking Assignment | first semester

As I have added active directory services, the installation progress begins.

SAJAN THAPA | SECTION A

84
Networking Assignment | first semester

After the installation is finished, I am going to add the new forest name nicasia.com.

SAJAN THAPA | SECTION A

85
Networking Assignment | first semester

After that it appears in capital letter NICASIA and the process begins and the server restarts.

SAJAN THAPA | SECTION A

86
Networking Assignment | first semester

The NICASIA appears in capital letter as we can see in the above screenshot.

NIC Asia appear on the form of NICASIA.com on the local server.

SAJAN THAPA | SECTION A

87
Networking Assignment | first semester

The IIS for the user creation.

SAJAN THAPA | SECTION A

88
Networking Assignment | first semester

I have created a user.

I have created user with password protection.

SAJAN THAPA | SECTION A

89
Networking Assignment | first semester

There, a user (sajan thapa) is created.

SAJAN THAPA | SECTION A

90
Networking Assignment | first semester

Creating webpage for nicasia.com with an IP address.

SAJAN THAPA | SECTION A

91
Networking Assignment | first semester

Here, I browsed the nicasia.com on internet explorer.

SAJAN THAPA | SECTION A

92
Networking Assignment | first semester

Inserting the IP into client for connection of the users.

SAJAN THAPA | SECTION A

93
Networking Assignment | first semester

After inserting IP address to the client, I ping through IP address and its name (nicasia.com)

SAJAN THAPA | SECTION A

94
Networking Assignment | first semester

After inserting domain name into the client, the message received as welcome message appear on
the screen.

As we can see that domain user can access the client services.

SAJAN THAPA | SECTION A

95
Networking Assignment | first semester

After entering the username and password we can see the domain name appear on the screen called
nicasia.com.

SAJAN THAPA | SECTION A

96
Networking Assignment | first semester

Test and evaluate the design to meet the requirements and analyze user
feedback with the aim of improving efficiency.

As per the requirement of the provided scenario, I have designed a network system in visio tool
and implemented the design in cisco packet tracer. For the completion of the task I am going to
make a test log consisting what is to be tested and expected output. I am going to evaluate the
design with the scenario requirement. Also, I am going to collect feedback from users. At last, I
will analyze the feedback.

Independent feedback

Project title: NIC ASIA BANK

Feedback given by: Bibek Baral Signature:

Date:10-11-2021
Project description (in brief): As per the requirement of the scenario, I have designed a
network system for the NIC Asia bank with the help of Visio tool and implemented it on Cisco
packet tracer. I have arranged numbers of PC for all departments as per the scenario. I have used
one router and one switch in every department. I have then added DHCP server in the network
to automatically assign IP addresses to each pc of all department. I have added mail server so
that employees can send emails to each other. Then, DNS is added to provide domain name to
the host IP. To prevent the network from computer viruses, unauthorized activities, I have
configured I have managed firewall in the system. I also configured VPN to create a secret tunnel
to provide a secure connection.

SAJAN THAPA | SECTION A

97
Networking Assignment | first semester

Important features of the 1. User friendly and effective


design 2. Project is run on every platform because cisco systems are
used.
3. Well managed design, security, organized IP,
interdepartmental contacts and data transfer facilities etc.
4. All information in the table can be automatically retrieved
from database.
5. Duplicate users cannot be added.
6. Login is only allowed for valid users having correct
username and password. Administrator has different
authentication than the users.
7. Remote management is available for handling of t
8. Automatic transfer and management of data from outside
as well as inside.

checklists Yes No Comments

Have identified DHCP server, yes These servers are configured in the design.
DNS server, FTP server, mail
server?

Have system requirements been yes System requirements are fulfilled.


defined and clear?
Is system aligned with proper yes Design is implemented as per the scenario
design? requirement.
Have the system been tested yes Necessary tests for the effectiveness of the
critically and reviewed? network are done.

SAJAN THAPA | SECTION A

98
Networking Assignment | first semester

Does the system solve the problem yes All systems are well managed and security is
of the client? provided to secure the entire network.
Does the system fulfill the yes All the necessary requirements are fulfilled
requirement of the client? Security and IP are provided by DHCP server.
and IP arranged as per the client’s
requirement?
Have implemented routing and yes Routing and switching are performed to
switching? make communication between connected
devices of the network.
Significance of the project 1. The design has well defined and manage hardware
system.
2. Information can be transferred anytime within network as
well as outside of local network.
3. Duplicate users cannot be added. For mail servers,
hardware security is there for protection against
unauthorized access of routers, switches and server.
4. Login is allowed for only valid users with correct
username and password. Administrator has different
authentication than users.
5. It supports remote management using telnet.
6. It supports vlan, intervlan, VPN communication with
other departments securely.
Project limitation 1. There are only two types of users (admin and user).
2. Without internet communication, there is no outside
LAN communication.
3. It lacks high security like ACL, NAT, port security etc.
4. Low range of hardware is used.
Feedback evaluation
Feedback evaluated by: Sajan Thapa Signature:

SAJAN THAPA | SECTION A

99
Networking Assignment | first semester

Date: 11-09-2021
Evaluation of the system: As an IT officer of NIC Asia bank, I have designed a network system
with the help of Visio tool and implemented the design in Cisco packet tracer. I have used the
same number of computers in each department as per the scenario. I have used one switch and
one router in each department. The fives routers are connected in a form of loop.

I have added DHCP server in the network to automatically assign IP addresses to each pc of all
department. I have added mail server so that employees can send emails to each other. Then,
DNS is added to provide domain name to the host IP. To prevent the network from computer
viruses, unauthorized activities, I have configured I have managed firewall in the system. I also
configured VPN to create a secret tunnel to provide a secure connection.
This network system is effective, productive and secure and meets the requirement of the NIC
Asia bank

Function of hardware: Hardware like router, switch, different cables, PC, printer, access point,
server, cables are used in the network.
• Router is used to interconnect wired as well as wireless devices.

• Switch is used to forward data packages to destination on LAN.

• Access point is used as point of interconnection between WLAN and fixed wired
network.

SAJAN THAPA | SECTION A

100
Networking Assignment | first semester

Sever are used to provide constant services to the clients. For example, File server manages and
stores data.

Routing:
Routing is performed to make connection between different network. It creates best route for
data packet transferring. I have done routing for network 192.168.10.0

Security:
For the security, firewall, VPN is configured in the network. firewall protects from unauthorized
access of the files within the network, VPN creates tunnel for secure data transmission. telnet is
configured to access another PC and router by administrator remotely.
Recommendation for the future consideration:

I have designed a network system that meets the requirement of the NIC Asia bank. I have
implemented the design properly. However, there are few limitations of the design like security.
These limitations can be eliminated to make the network system more productive and effective.
Expensive and high configuration can be used to make it more secure, efficient and reliable. For
high security, ACL, NAT, Port security and be configured in the network.

Test log:
S.no What is to be tested Expected output

1. DHCP testing IP addresses automatically assigned to all connected devices


2. DNS testing Web page can be accessed.
3. telnet testing Administrator is able to access others PC remotely.
4. Email testing Email can be sent from source to destination.
5. Routing testing Ping can be performed from one computer to another
6. VPN testing Built a secure connection.
7. Firewall testing Denied network cannot access the internal network.

SAJAN THAPA | SECTION A

101
Networking Assignment | first semester

8. Domain controller Other domain are able to share resources within network only
testing while authorized member can use all the services of the company
within that network.

Maintenance schedule to support the networked system.

I have designed a network system for the new branch of NIC Asia bank as per device, software,
security requirement of the given scenario. There are different hardware and software in the
network. These hardware and software can malfunction unexpectedly at any time. As the NIC Asia
bank is a huge company, a stop on the network system can create a huge loss. So, maintenance of
its network system should be done from time to time. To keep the network well managed and
effective, following steps should be carried out.

• Troubleshooting network problem

• Installation and improving the network performance

• Planning for future network growth

• Creating network documentation and keeping it up to date

• Securing the network against all kind of threats

These tasks should be performed for the maintenance of the network system. I have divided the
whole maintenance work on the basis of following factors for the backup, upgrades, security and
auditing. These are the maintenance tasks to make system better and faster.

I have made a schedule for the maintenance work for the network system of the network system.
I have prepared it using Gannt chart.

Gann chart for network schedule:

SAJAN THAPA | SECTION A

102
Networking Assignment | first semester

Maintenance schedule:

S.NO Considerations Time interval


1. Backup daily
2. upgrade monthly
3. security Daily and weekly
4. Troubleshooting monthly

Backup:

Backup is the process of creating and storing the copy of original data of the devices on the network
system so that it can be used when the data is stolen or corrupted. Hardware do crash and files get
corrupted. So, in case of original data damage, backup is very useful. These disasters can happen
any time. So, daily backup is very essential. Therefore, I have prepared daily backup schedule for

SAJAN THAPA | SECTION A

103
Networking Assignment | first semester

the maintenance work instead of weekly, monthly or yearly schedule. As many servers are stacked
in rack server, data can be backed up in multiple servers.

Upgrade:
Upgrading in a network system is really essential. Adding or replacing better hardware and
software provides flexibility to a network system. Better hardware and software provide better
efficiency with less chances of failure. It also provides access to more powerful computing, better
security and more storage space. It makes the system more productive. Therefore, I have prepared
a monthly upgrade schedule for the maintenance work.

Security:
Network security is the most important in the network system to protect from unauthorized access,
misuse, malfunction, modification, destruction, or improper disclosure, destruction etc. I have
implemented firewall in the network system, which handles the incoming and outcoming traffic
and decides whether to block or allow the traffic using set of rules. To secure the network, regular
scanning of the network and checking the firewall configuration is necessary. So, I have prepared
daily and weekly schedule for the maintenance work.

Troubleshooting:
Trouble shooting is the combination of methods, steps and processes that is used to identify,
diagnose and solve problems throughout a network. It is a logical process which is used by network
administrators to solve the problem of computer network and improve the network. there are many
hardware/software used to build a network. They can malfunction and create troubles. It can
obstacle the work in the NIC Asia bank. So, I have prepared a monthly schedule for
troubleshooting of the computer network to keep it running effectively.

SAJAN THAPA | SECTION A

104
Networking Assignment | first semester

Implement a networked system based on a prepared design.

Network implementation
As per the scenario, I have designed a network system and implemented it in cisco packet tracer.
I have worked with different PC, routers, switches, server, cables etc. I have provided IP addresses
to all devices of the entire network with gateways. As NIC Asia bank is a very big company, I
have managed all the system with security. I have configured all cisco devices and assigned IP
address, security, routing, DNS, DHCP and mail server also. As a big company, employees of NIC
Asia bank need to connect to each other. I have assigned mail address through which all employees
can interconnect. As the company requires HTTP page, I have also managed it. Some of the
configuration screenshots are provided below:

IP configuration
At first, I configured IP addresses manually then I added a DHCP server that assigns IP addresses
automatically.

DHCP
I added DHCP server to assign IP addresses to each PC automatically.

SAJAN THAPA | SECTION A

105
Networking Assignment | first semester

IP route
After assigning IP addresses to each PC, I did routing. The picture below is the IP
route.

Password
After that, I provided password security to all devices to secure files, documents.

SAJAN THAPA | SECTION A

106
Networking Assignment | first semester

Enable secrete
Enable secrete provides an additional layer of security. With enable secrete, the password is
encrypted.

SAJAN THAPA | SECTION A

107
Networking Assignment | first semester

SAJAN THAPA | SECTION A

108
Networking Assignment | first semester

DNS
DNS domain name into IP addresses, which browsers use to load web pages

SAJAN THAPA | SECTION A

109
Networking Assignment | first semester

HTTP
It provides users a way to interact with web resources such as HTML files by transmitting
hypertext messages between clients and servers.

SAJAN THAPA | SECTION A

110
Networking Assignment | first semester

SAJAN THAPA | SECTION A

111
Networking Assignment | first semester

Email
It is used to create email address with the domain name that we provided to the server.

SAJAN THAPA | SECTION A

112
Networking Assignment | first semester

Recommendation for potential enhancement for the network system

As an IT officer of NIC Asia bank, I have designed a network system and implemented it on cisco
packet tracer. Several hardware, software along with VMware workstation is used to build the
network system.

As for the client PC configuration, intel i7 processor, 8 GB RAM, 1 GB graphics, windows 10


operating system (64-bit OS), X64-based processor, Sophos XF firewall and hardware devices like
router, switches, hubs, server, access point are used. I have chosen rack server over tower server
and blade server.

Although this hardware /software are suitable, effective, efficient for the designed network, they
are low range/low-end devices. The network system can be made more productive, efficient and
effective through the replacement of those devices, software. Higher performance devices can be
used in order to get the best of the designed network system. This will result in the enhancement
of the potential of the network communication. The major potential that can be used for the system
are discussed below:

1. Hardware

For the hardware enhancement, the currently used processor can be replaced with a better one. We
have used intel i7 processor which is the latest one of the intel company.

But we can use AMD Ryzen 9 5900X processor which has higher performance capability than
intel i7. We can upgrade 8 GB RAM with 16 GB or higher for higher data efficiency and helping
in faster data processing. 500 HDD can be upgraded to 1TB SSD to make computer more effective

SAJAN THAPA | SECTION A

113
Networking Assignment | first semester

and provide it more storage space. As the company goes on progressing and expanding, the blade
server can be more efficient over rack server. Blade server would be perfect for providing service
to the clients in such a large organization.

2. Software

Software has a vital role in optimizing hardware devices. The current operating system can be
upgraded to the latest one when it is available. Windows 10 operating system has been currently
used for the client PC. After windows 11 operating system, we can replace windows 10 with it.
Latest operating system provides better feature, security which can be more productive. Latest
firewall can be used to make network immune against dangerous computer viruses and against
hackers.

3. Security

For a company like a bank, threats like information theft, data loss, malware, hacking attempts,
unauthorized activities can be common and troublesome. For the prevention against these risks,
installing the latest firewall can be very useful. There are different types of firewall security devices
like watch guard firebox T10, Cyberoam CR 15iNG, checkpoint 1100 appliances etc. available.
Watch guard helps users to create, edit policies, manage certificates, subscription services.

4. Cables

Several types of cables are used in LAN, MAN and WAN. The type of cable determines the data
transfer speed of the network. so, cables are really important for a network. Gigabit ethernet cables
routers are commonly used as it provides bandwidth of 10 MBPS, 100 MBPS. It supports all three
types of cable. Cat 5, Cat 5e had been most commonly used in the past whereas Cat 6 is commonly
used at the present. Cat 6 is suitable for 10 Gigabit uses and Cat 7 is suitable for 40 Gigabit uses.
Cat 6 is suitable for the designed network but Cat 7 can be used if higher data transfer speed is
required for the network.

SAJAN THAPA | SECTION A

114
Networking Assignment | first semester

5. Switch

For an efficient and effective network system we need to select a best switch for the ethernet
connection. There are many decent switches available. TP-Link TL-SG108 with 8 Gigabit ports
has the best budget and can deliver a good performance. It has switching speed of 16Gbps.
NETGEAR Nighthawk S8000 with 8 Gigabit ports is versatile for home and office. It also has
switching speed of 16Gbps. The most suitable one for the NIC Asia bank is TRENDnet TEG-
224DG with 24 Gigabit ports, it is suitable for large organizations. It has switching speed of
48Gbps.

Document and analyze test results against expected results.


As per the scenario, I have built an effective network system for the NIC Asia bank, Gauradaha
branch. I have implemented the network design in Cisco packet tracer. To make the network more
effective I am going to create a test log for the tests I have done in the configuration of the network.
The test log consist of what is to be tested, its test date, expected output and the actual output.

Test Date What testing is done Expected output Actual output


20-09-2021 DHCP testing PCs connected to the Each PC is assigned IP
DHCP server should be address automatically
assigned IP addresses by DHCP server.
automatically.

SAJAN THAPA | SECTION A

115
Networking Assignment | first semester

SAJAN THAPA | SECTION A

116
Networking Assignment | first semester

Test Date What testing is done Expected output Actual output

20-09-2021 Mail testing I have created mail ID in Email is received in IT


IT department and department successfully.
finance department. then I
composed mail in finance
department to IT
department. The mail
should be received by IT
department.

SAJAN THAPA | SECTION A

117
Networking Assignment | first semester

SAJAN THAPA | SECTION A

118
Networking Assignment | first semester

Test Date What testing is done Expected output Actual output


20-09-2021 HTTP Typing its webpage on The webpage is
the browser should displayed on the
access the webpage browser successfully.
that I created.

SAJAN THAPA | SECTION A

119
Networking Assignment | first semester

SAJAN THAPA | SECTION A

120
Networking Assignment | first semester

Test Date What testing is done Expected output Actual output


20-09-2021 Password testing PC or system should be PC or system is
accessed only through accessible with the
correct password. correct password.

SAJAN THAPA | SECTION A

121
Networking Assignment | first semester

Test Date What testing is done Expected output Actual output


20-09-2021 DNS testing DNS should provide DNS having IP address
domain name for IP contains
address to enter web nicasiabank.com for
page. login page.

SAJAN THAPA | SECTION A

122
Networking Assignment | first semester

Test Date What testing is done Expected output Actual output


20-09-2021 PC-to-PC PC connected to router Each PC gets
are assigned IP address connected with ping IP
automatically. address to each other
and transmit and
receive data.

SAJAN THAPA | SECTION A

123
Networking Assignment | first semester

Test Date What testing is done Expected output Actual output


20-09-2021 FTP testing I created FTP server The output is
then I pinged with the successful without
IP address and HTTP losing data.
address.

SAJAN THAPA | SECTION A

124
Networking Assignment | first semester

SAJAN THAPA | SECTION A

125
Networking Assignment | first semester

Test Date What testing is done Expected output Actual output


20-09-2021 IIS testing IIS installed with web IIS contains with TFTP
server. and web server.

SAJAN THAPA | SECTION A

126
Networking Assignment | first semester

SAJAN THAPA | SECTION A

127
Networking Assignment | first semester

Use critical reflection to evaluate own work and justify valid conclusions.

As per the scenario, as an IT officer, I have designed and implemented a network system for the
new branch of NIC Asia bank located in Gauradaha. For the effectiveness of the network system,
first I designed the network system and then made plans for the appropriate network. In the given
task, I have mentioned the positive aspects as well as the negative aspects of the network system.
I further provided recommendation and feedback form in above tasks.

I chose peer-to-peer network architecture and cloud computing for the network system of NIC
Asia bank. The setup cost of peer-to-peer architecture is low and it is easy to install. It also makes
data transferring easy. Cloud computing helps to provide backup in the network. It helps in clearing
up storages spaces in individual PCs and helps to boost up their performance.

SAJAN THAPA | SECTION A

128
Networking Assignment | first semester

According the feedback, low range of security is used in the network system of the NIC Asia bank.
So, I have chosen higher security system using NAT and port security. NAT is used to hide the IP
address and single IP is applicable for entire PC.

At first, low range of devices are used in the network system as per the received feedback. I have
selected devices of higher range. I chose the rack server which would be suitable for the given
scenario. Rack server is reliable, effective consumes less space and power. On rack sever, data is
stored in two or more than two servers. There is less chance of data loss because if one HDD is
corrupted, it automatically transfers the server to the next HDD.

After I was done with necessary hardware/software changes, I implemented the design on cisco
packet tracer. After creating the network, I did necessary testing. First, I did DHCP server testing.
I checked on every PC to check whether the IP addresses are assigned automatically or not. Then,
I performed DNS testing to check if webpage can be accessed. After that, I performed email testing
to see if mails can be forwarded to the destination. telnet provides remote access to all PC to the
administrator. I did Routing testing to test ping to another PC. VPN creates secret tunnel and
firewall ensures denied network cannot access internal network. the positive aspects of the network
are implemented on the design. The negative aspect is that it costs more than normal PC and server.

Conclusion
In conclusion, I have designed a networking system for the NIC Asia bank as per the given
scenario. I have tested all the necessary steps to make it be reliable and efficient.

SAJAN THAPA | SECTION A

129
Networking Assignment | first semester

References

computer network | Definition & Types (2021). Available at:


https://www.britannica.com/technology/computer-network (Accessed: 10 August 2021).

Overview of Personal Area Network (PAN) - GeeksforGeeks (2020). Available at:


https://www.geeksforgeeks.org/overview-of-personal-area-network-pan/ (Accessed: 10 August
2021).

Types of Computer Network: What is LAN, MAN and WAN (2021). Available at:
https://www.guru99.com/types-of-computer-network.html (Accessed: 10 August 2021).

SAJAN THAPA | SECTION A

130
Networking Assignment | first semester

What is a Campus Area Network (CAN)? - Definition from Techopedia (2021). Available at:
https://www.techopedia.com/definition/25931/campus-area-network-can (Accessed: 10 August
2021).

Client-Server Model - GeeksforGeeks (2019). Available at: https://www.geeksforgeeks.org/client-


server-model/ (Accessed: 11 August 2021).

What is peer-to-peer (P2P)? - Definition from WhatIs.com (2021). Available at:


https://www.techtarget.com/searchnetworking/definition/peer-to-peer (Accessed: 11 August
2021).

What is Cloud Computing? Beginner's Guide (2021). Available at:


https://www.salesforce.com/products/platform/best-practices/cloud-computing/ (Accessed: 11
August 2021).

Cluster Computing: Definition, Types, Advantages & Applications (2020). Available at:
https://www.watelectronics.com/cluster-computing-architecture-its-types/ (Accessed: 11 August
2021).

Distributed Computing | Advantages and Disadvantages (2020). Available at:


https://computernetworktopology.com/distributed-computing/ (Accessed: 12 August 2021).

What is OSI Model | 7 Layers Explained | Imperva (2021). Available at:


https://www.imperva.com/learn/application-security/osi-model/ (Accessed: 14 August 2021).

SAJAN THAPA | SECTION A

131
Networking Assignment | first semester

What are the IEEE 802 Standards? (2021). Available at:


https://www.techtarget.com/searchnetworking/reference/IEEE-802-Wireless-Standards-Fast-
Reference (Accessed: 14 August 2021).

What is Network Topology? Definition and FAQs | OmniSci (2021). Available at:
https://www.omnisci.com/technical-glossary/network-topology (Accessed: 15 August 2021).

ManageEngine, c. (2021) Network Monitoring Software by ManageEngine


OpManager, ManageEngine OpManager. Available at:
https://www.manageengine.com/network-monitoring/network-protocols.html (Accessed: 15
August 2021).

Computer Network Topology - Mesh, Star, Bus, Ring and Hybrid (2019). Available at:
https://beginnersbook.com/2019/03/computer-network-topology-mesh-star-bus-ring-and-hybrid/
(Accessed: 15 August 2021).

Guided Transmission Media - javatpoint (2021). Available at:


https://www.javatpoint.com/guided-transmission-media (Accessed: 15 August 2021).

Types of Transmission Media - GeeksforGeeks (2018). Available at:


https://www.geeksforgeeks.org/types-transmission-media/ (Accessed: 16 August 2021).

UnGuided Transmission Media - javatpoint (2021). Available at:


https://www.javatpoint.com/unguided-transmission-media (Accessed: 16 August 2021).

SAJAN THAPA | SECTION A

132
Networking Assignment | first semester

Computer Networking Devices Explained with Function (2021). Available at:


https://www.computernetworkingnotes.com/networking-tutorials/computer-networking-devices-
explained-with-function.html (Accessed: 19 August 2021).

Network Devices (2021). Available at:


https://www.tutorialspoint.com/communication_technologies/communication_technologies_net
work_devices.htm#:~:text=Advertisements,%2Dnetwork%20or%20intra%2Dnetwork.
(Accessed: 19 August 2021).

Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter) -
GeeksforGeeks (2015). Available at: https://www.geeksforgeeks.org/network-devices-hub-
repeater-bridge-switch-router-gateways/ (Accessed: 19 August 2021).

(Services, P. (2021) What Is Wi-Fi? - Definition and Types, Cisco. Available at:
https://www.cisco.com/c/en/us/products/wireless/what-is-wifi.html (Accessed: 19 August 2021))

workstation | Definition & Facts (2021). Available at:


https://www.britannica.com/technology/workstation (Accessed: 20 August 2021).

server | Definition, Examples, & Facts (2021). Available at:


https://www.britannica.com/technology/server (Accessed: 20 August 2021).

SAJAN THAPA | SECTION A

133
Networking Assignment | first semester

Blade Servers vs Rack Servers vs Tower Servers | ServerWatch (2020). Available at:
https://www.serverwatch.com/hardware/blade-servers-vs-rack-servers/ (Accessed: 20 August
2021).

Client Operating (OS) System Technology - IT Training & Certification - Infoventure


Technologies (2021). Available at: https://www.infoventure.com/client-operating-system.html
(Accessed: 24 August 2021).

What is A Server Operating System? | Webopedia (2014). Available at:


https://www.webopedia.com/definitions/server-operating-system/ (Accessed: 26 August 2021).S

SAJAN THAPA | SECTION A

134

You might also like