Cutting Edge IT Solution Networking
Cutting Edge IT Solution Networking
Cutting Edge IT Solution Networking
INTERNATIONAL SCHOOL OF
MANAGEMENT AND TECHNOLOGY
FACULTY OF COMPUTING
STUDENT DETAILS
Nischal Gurung
STUDENT NAME
STUDENT ID
ESTIMATED 8000
WORD LENGTH
SUBMISSION
NISCHAL GURUNG 1
Cutting-edge it solution
1. I declare that:
a) this assignment is entirely my own work, except where I have included
fully-documented references to the work of others,
b) the material contained in this assignment has not previously been
submitted for any other subject at the University or any other educational
institution, except as otherwise permitted,
c) no part of this assignment or product has been submitted by me in another
(previous or current) assessment, except where appropriately referenced,
and with prior permission from the Lecturer / Tutor / Unit Coordinator for
this unit.
2. I acknowledge that:
a) if required to do so, I will provide an electronic copy of this assignment to
the assessor;
b) the assessor of this assignment may, for the purpose of assessing this
assignment:
I. reproduce this assignment and provide a copy to another member
of academic staff;
II. communicate a copy of this assignment to a plagiarism checking
service such as Plagiarism Check (which may then retain a copy of
this assignment on its database for the purpose of future plagiarism
checking).
NISCHAL GURUNG 2
Cutting-edge it solution
I am aware of and understand that any breaches to the Academic Code of Conduct
will be investigated and sanctioned in accordance with the College Policy.
NISCHAL GURUNG 3
Cutting-edge it solution
Preface:
Computer networks have become an essential component of contemporary civilization in the
fast-evolving technology landscape of today, revolutionizing the ways in which we interact,
cooperate, and access information. A wide and linked web of communication has been
created by the seamless integration of devices and systems, enabling the sharing of
information and resources on a global scale. This thorough book seeks to provide a clear and
in-depth explanation of the underlying concepts, principles, and components that underlie
these complex systems as we dig into the realm of computer networks.
NISCHAL GURUNG 4
Cutting-edge it solution
Table of Contents
Preface:...................................................................................................................................4
Introduction..........................................................................................................................10
Objective:.............................................................................................................................10
Scope....................................................................................................................................11
Task 1...................................................................................................................................12
Computer Networking..........................................................................................................12
Physical Network.................................................................................................................12
Advantages of PAN:............................................................................................................14
Disadvantages of PAN.........................................................................................................14
Advantages:..........................................................................................................................15
Disadvantages of LAN:........................................................................................................15
Benefits:...............................................................................................................................17
Cons:....................................................................................................................................17
Benefits:...............................................................................................................................18
Cons:....................................................................................................................................19
Logical Network:.................................................................................................................19
Advantages:..........................................................................................................................20
Disadvantage:.......................................................................................................................20
Advantages:..........................................................................................................................21
Disadvantages:.....................................................................................................................21
NISCHAL GURUNG 5
Cutting-edge it solution
Advantages:..........................................................................................................................22
Disadvantages:.....................................................................................................................22
Overview:.............................................................................................................................22
Transmission Medium:.........................................................................................................23
1. Wired Network:.............................................................................................................23
Benefits:...............................................................................................................................23
Constraints:..........................................................................................................................24
2. Wireless Network:.........................................................................................................24
Advantages:..........................................................................................................................24
Disadvantages:.....................................................................................................................24
3. Hybrid Network:...........................................................................................................24
Benefits:...............................................................................................................................24
Cons:....................................................................................................................................24
Overview:.............................................................................................................................26
Network Standard:...............................................................................................................26
OSI Model:...........................................................................................................................28
1. Physical Layer...............................................................................................................28
3. Network Layer..............................................................................................................29
4. Transport Layer.............................................................................................................29
5. Session Layer................................................................................................................29
6. Presentation Layer.........................................................................................................29
7. Application Layer..........................................................................................................30
TCP/IP..................................................................................................................................31
NISCHAL GURUNG 6
Cutting-edge it solution
Advantages of TCP/IP:........................................................................................................31
Disadvantages of TCP/IP:....................................................................................................32
IEEE Standard:.....................................................................................................................32
Overview:.............................................................................................................................33
Network Topology:..............................................................................................................33
Logical Topology:................................................................................................................33
Physical Topology:...............................................................................................................34
1. Mesh Topology.............................................................................................................34
Advantages:..........................................................................................................................34
Disadvantages:.....................................................................................................................35
2. Star Topology................................................................................................................35
3. Bus Topology................................................................................................................36
Advantages:..........................................................................................................................36
Disadvantages:.....................................................................................................................36
4. Ring Topology:.............................................................................................................36
Advantages:..........................................................................................................................37
Disadvantages:.....................................................................................................................37
Hybrid Topology..................................................................................................................37
Benefits:...............................................................................................................................38
Cons:....................................................................................................................................38
Tree Topology:.....................................................................................................................38
Advantages:..........................................................................................................................39
Disadvantages:.....................................................................................................................39
NISCHAL GURUNG 7
Cutting-edge it solution
Overview:.............................................................................................................................40
Network Protocol.................................................................................................................40
Overview..............................................................................................................................41
Networking Devices.............................................................................................................41
1. Switch............................................................................................................................41
2. Router............................................................................................................................41
3. Hub................................................................................................................................41
4. Firewall.........................................................................................................................41
5. Server............................................................................................................................42
6. Workstation (PC)..........................................................................................................42
Overview:.............................................................................................................................43
Server Configuration............................................................................................................44
Task 2...................................................................................................................................45
Network Design...................................................................................................................45
IP Sheet:...............................................................................................................................46
Device Requirements...........................................................................................................46
Overview..............................................................................................................................47
1. VTP...............................................................................................................................47
2. VLAN............................................................................................................................48
NISCHAL GURUNG 8
Cutting-edge it solution
3. DHCP............................................................................................................................48
4. HTTP.............................................................................................................................49
5. DNS...............................................................................................................................50
6. EMAIL..........................................................................................................................51
7. FTP................................................................................................................................52
8. ROUTING.....................................................................................................................53
1. TELNET........................................................................................................................54
2. Firewall.........................................................................................................................55
Result,...................................................................................................................................56
Result:..................................................................................................................................57
Result,...................................................................................................................................58
Results:.................................................................................................................................60
Result,...................................................................................................................................61
1. Start by running the download VMware installation file. This will initiate the VMware
workstation Pro installation process.....................................................................................62
2. For the installation of the server from a .iso file. Here we need to install Server2012R2
then go to create a new virtual machine and set the minimum required hard disk to 30 GB
and RAM 4GB.....................................................................................................................63
Maintenance Schedule:........................................................................................................91
Gantt Chart:..........................................................................................................................91
Testing and evaluating the design to meet the requirements and analyzing user feedback: 91
Hardware..............................................................................................................................93
NISCHAL GURUNG 9
Cutting-edge it solution
Software...............................................................................................................................93
Security................................................................................................................................94
Server:..................................................................................................................................94
Physical Server:....................................................................................................................94
Logical Server:.....................................................................................................................95
File Server:...........................................................................................................................95
Print Server:.........................................................................................................................95
Network Server:...................................................................................................................95
Application Server:..............................................................................................................95
Database Server:...................................................................................................................95
Email Server:........................................................................................................................95
Overview:.............................................................................................................................96
References:...........................................................................................................................98
NISCHAL GURUNG 10
Cutting-edge it solution
Introduction
Cutting Edge IT solution is an appreciated and trustworthy IT service which provide IT
services to the customers which is situated in Kathmandu. The organization has recently
made the strategic decision to establish a new branch in Butwal, aiming to extend its
reach and offer cutting-edge technology devices and applications to the general
public. As the newly appointed IT officer in the IT Department, my primary
responsibility entails planning, managing, designing, developing, and optimizing the
networking system for this expansion. I am entrusted with the crucial task of
creating a seamless and efficient network infrastructure to support the organization's
operations and deliver a seamless experience to both staff and customers at the new
branch.
Objective:
To create optimized network system.
To deploy and troubleshoot network system.
Analysing network equipment, principles, their protocols, and functions.
Scope
With the help of various department, its ultimate goal is to provide a secure, efficient, and
reliable network ensuring network security and performance.
NISCHAL GURUNG 11
Cutting-edge it solution
Task 1
Computer Networking
As per (Spiceworks, 2023) A network is nothing more than two or more computers connected
by a cable or by a wireless radio connection so that they can exchange information. Of
course, computers can exchange information in ways other than networks. Most of us have
used what computer nerds call the sneakernet. That’s where you copy a file to a flash drive or
other portable storage device and then walk the data over to someone else’s computer.
1. Physical Network
2. Logical Network
Slide 1
Physical Network
Physical Network refers to how the components of a network are organized and connected. It
involves the arrangement of network devices and the physical cables that connect them. Some
of the physical networks are as follows:
NISCHAL GURUNG 12
Cutting-edge it solution
Slide 2
NISCHAL GURUNG 13
Cutting-edge it solution
Advantages of PAN:
Here are some of the important benefits of PAN network:
Disadvantages of PAN
It may establish a bad connection to other networks at the same radio bands.
Distance limits.
NISCHAL GURUNG 14
Cutting-edge it solution
Advantages:
Computer resources like hard-disks, DVD-ROM, and printers can share local area
networks. This significantly reduces the cost of hardware purchases.
You can use the same software over the network instead of purchasing the licensed
software for each client in the network.
Data of all network users can be stored on a single hard disk of the server computer.
You can easily transfer data and messages over networked computers.
It will be easy to manage data at only one place, which makes data more secure.
Local Area Network offers the facility to share a single internet connection among all
the LAN users.
Disadvantages of LAN:
LAN will indeed save cost because of shared computer resources, but the initial cost
of installing Local Area Networks is quite high.
NISCHAL GURUNG 15
Cutting-edge it solution
The LAN admin can check personal data files of every LAN user, so it does not offer
good privacy.
Unauthorized users can access critical data of an organization in case LAN admin is
not able to secure centralized data repository.
Local Area Network requires a constant LAN administration as there are issues
related to software setup and hardware failures.
NISCHAL GURUNG 16
Cutting-edge it solution
Benefits:
WAN helps you to cover a larger geographical area. Therefore, business offices
situated at longer distances can easily communicate.
Contains devices like mobile phones, laptop, tablet, computers, gaming consoles, etc.
WLAN connections work using radio transmitters and receivers built into client
devices.
Cons:
The initial setup cost of investment is very high.
NISCHAL GURUNG 17
Cutting-edge it solution
It is difficult to maintain the WAN network. You need skilled technicians and
network administrators.
There are more errors and issues because of the wide coverage and the use of different
technologies.
It requires more time to resolve issues because of the involvement of multiple wired
and wireless technologies.
Offers lower security compared to other types of networks in computer.
Benefits:
It offers fast communication using high-speed carriers, like fiber optic cables.
It provides excellent support for an extensive size network and greater access to
WANs.
The dual bus in MAN network provides support to transmit data in both directions
concurrently.
A MAN network mostly includes some areas of a city or an entire city.
Cons:
You need more cable to establish MAN connection from one place to another.
NISCHAL GURUNG 18
Cutting-edge it solution
Logical Network:
A logical network is a representation of a network that, though it may actually be a portion of
a larger or local area network, gives users the idea that it is autonomous and isolated.
Slide 3
NISCHAL GURUNG 19
Cutting-edge it solution
Advantages:
This network is easier to set up.
It is less expensive.
All nodes act as server as well as client therefore no need of dedicated server.
Disadvantage:
Computer can be accessed anytime.
Network security must be applied to each computer separately.
Backup must be performed on each computer separately.
NISCHAL GURUNG 20
Cutting-edge it solution
Advantages:
Users can access all data anytime and anywhere.
The size can be expanded as per the requirement.
It is capable to bear massive usage.
Disadvantages:
It needs special network operating system.
Its more expensive
Well qualified technical staffs are required for maintaining the server.
NISCHAL GURUNG 21
Cutting-edge it solution
Advantages:
They provide flexibility and manage wide range of services.
It is cost efficient.
It provides robust security and have data durability.
Disadvantages:
It relies on internet if there is any disturbance than it can affect the performance of
cloud services.
Cloud consumers have little control over the underlying operations and service
delivery because ownership and management of the infrastructure are transferred to
the service provider.
Overview:
Here, I have used Client- Server networking for logical network for managing, performance,
scalability, security, resources, and availability. With this server, the company can deliver the
NISCHAL GURUNG 22
Cutting-edge it solution
various services to other side client machine for grabbing those services. And I have used
LAN and MAN as physical network because it can connect large amount of location server
and the company of Butwal connect small number of areas where it can provide high speed
data transfer, security, cost efficient, reliable and performance. And if the network in near
future expands then it can also provide better services to clients.
Transmission Medium:
A transmission medium is a physical connection or pathway through which data is
transmitted from one to other devices in a network. There are 3 types of transmission media
used in networking:
Slide 4
1. Wired Network:
A Wired Network is a type of network architecture where devices are interconnected through
physical cable to transmit the data signals providing a reliable and consistent means of
communication.
Benefits:
Wired network is more stable and reliable then wireless network.
It provides high speed data where large file can be transferred fast.
NISCHAL GURUNG 23
Cutting-edge it solution
It provides best security for data transfer because data is transmitted through physical
cable, and it is harder to intercept.
Constraints:
It requires cables to connect which make difficult to move around.
For installing it requires proper planning and management.
2. Wireless Network:
A wireless network is the process of transferring the data, communicating with devices
without the need of physical cables.
Advantages:
Wireless network can be easily accessed anywhere within the range of network.
It is easy to install.
It is cost efficient.
It provides fast speed of transferring data.
Disadvantages:
Network can be accessed without authorization.
It has limited range of speed.
3. Hybrid Network:
Hybrid Network is a type of network that connects both wired and wireless elements to form
a combined network.
Benefits:
It provides flexible high-speed connection to access network and resources.
Organizations can ensure backup connectivity and maintenance.
Cons:
This network is expensive.
It is very complex.
NISCHAL GURUNG 24
Cutting-edge it solution
NISCHAL GURUNG 25
Cutting-edge it solution
Overview:
I have chosen hybrid network as transmission medium of networks because it includes both
wired and wireless network which provide wide range of benefits, flexibility, mobility, and
adaptability for organizations. With these advantages it makes organizations run smoothly to
establish robust, adaptable and network infrastructure.
Network Standard:
A standard is an agreed-upon definition of a protocol. As a result, we couldn’t easily mix
equipment from different manufacturers on a single network. Then along came standards to
save the day. Hurrah! Because standards are industry-wide protocol definitions not tied to a
particular manufacturer, you can mix and match equipment from different vendors. As long
as the equipment implements the standard protocols, it should be able to coexist on the same
network. (Arley, 2021)
Slide 5
NISCHAL GURUNG 26
Cutting-edge it solution
Slide 6
Slide 7
NISCHAL GURUNG 27
Cutting-edge it solution
Slide 8
OSI Model:
The OSI model, also known as the Open Systems Interconnection Reference Model, is a
conceptual framework that organizes the various aspects of a computer network into seven
discrete layers. These layers can be likened to the layers of an onion, where each layer wraps
around and conceals the complexities of the layer beneath it. However, comprehending the
intricacies of the OSI model can be a demanding task, much like the act of peeling back
layers of an onion that can lead to tears. Unlike Ethernet and TCP/IP, which are specific
networking standards, the OSI model serves as a framework that accommodates various
networking standards. It outlines which aspects of a network's operation can be addressed by
different network standards. Here are the seven layers of OSI Model, given bellow:
1. Physical Layer
It is the layer that deals with the physical components of the network infrastructure. It
includes things like connectors, cable length restrictions, and other physical properties as well
as the cables used for connectivity. For instance, the electrical characteristics of twisted-pair
cables, the requirements for connections, the maximum cable length, and more are all
specified in the Ethernet standard for 10BaseT cable. Physical layer applications include star,
bus, ring, and mesh network topologies.
NISCHAL GURUNG 28
Cutting-edge it solution
3. Network Layer
The network layer is responsible for routing. network messages between computers. The
network layer, which corresponds to layer 3 of the OSI model, is closely linked with specific
protocols. Among these, the most widely utilized are IP (Internet Protocol) in conjunction
with TCP (Transmission Control Protocol), and IPX (Internetwork Packet Exchange) paired
with SPX (Sequenced Packet Exchange), which are commonly employed in Novell and
Windows networks. These layer 3 protocols facilitate the transmission of data across
networks by handling addressing and routing functions.
4. Transport Layer
The transport layer is the layer to find two of the most well-known networking protocols i.e.,
TCP (typically paired with IP) and SPX (typically paired with IPX). The transport layer is
concerned with the transportation of information from one computer to anoth```````er.
5. Session Layer
The session layer establishes conversations sessions between networked devices. A session is
an exchange of connection-oriented transmissions between two network devices. Each
transmission is handled by the transport layer protocol. The session itself is managed by the
session layer protocol. A single session can include many exchanges of data between the two
computers involved in the session.
6. Presentation Layer
2020)The presentation layer is responsible for how data is represented to applications. The
most common representation for representing character data today is called UTF-8, which
uses 8-bit sets to represent most characters found in western alphabets. UTF-8 is compatible
with an older standard called ASCII.
NISCHAL GURUNG 29
Cutting-edge it solution
7. Application Layer
The highest layer of the OSI model, the application layer deals with the techniques that
application programs use to communicate with the network. The name of this layer is a little
confusing. Application programs (such as Microsoft Office or QuickBooks) aren’t a part of
the application layer.
When the receiving computer receives the data, the data works its way up through the
protocol stack. Then, the protocol at each layer reverses the processing that was done by the
corresponding layer on the sending computer. Headers are removed data is converted back to
its original format, packets that were split into smaller packets are recombined into larger
NISCHAL GURUNG 30
Cutting-edge it solution
messages and so on. When the packet reaches the application layer protocol, its delivered to
an application that can process the data.
TCP/IP
As per (Shacklett, Novotny and Gerwig, 2021) TCP/IP is a rule that allows two or more
entities of a communication system used to interconnect network devices on the internet and
it also connects to private network.
Advantages of TCP/IP:
It connects different computers together.
It is compatible with any operating system.
It supports various routing methods.
NISCHAL GURUNG 31
Cutting-edge it solution
Disadvantages of TCP/IP:
Packets may not always be delivered reliability at the transport layers.
Replacing the TCP/IP protocol is hard.
It lacks clear distinction between services, interfaces, and protocols.
IEEE Standard:
IEEE Stands for Institute of Electrical and Electronics Engineers. It plays a vital role in the
field of networking and the main goal got IEEE is to bring up new innovation and vast
technology for the benefit of humanity. In order for all networking devices to interact and
function properly, it needs network service, i.e., the Internet and its related technologies, must
adhere to a set of rules and practices.
There are different types of IEEE standards in computer network. Some of them are listed
below:
NISCHAL GURUNG 32
Cutting-edge it solution
Overview:
As per the requirements of the company I have used TCP/IP as network standards for
network connection because of its simplicity and widespread adaption of network.
Network Topology:
A network topology is the physical and substantial arrangement of a network. This decided,
how do these computers in the network link to each other. For the proper arrangements of
branch as per the condition given in scenario there need to proper selection of network
topology which play vital role for the arrangements of system. It helps in position of nodes
and data transmission between the nodes. It also helps to reduce the operational and
maintenance costs such as cabling costs. A network topology is a factor in determining the
media type to be used to cable a network.
NISCHAL GURUNG 33
Cutting-edge it solution
Slide 9
Logical Topology:
In a computer network, logical topology describes how devices are logically connected and
communicate with one another. Regardless of the physical configuration of the network, it
represents the logical pathways or courses that data takes as it moves between devices.
Physical Topology:
The tangible elements and infrastructure that allow for device connection and communication
within a computer network are referred to as a physical network. It includes all of the tangible
gear, tools, and apparatus used to physically connect network nodes and transfer data
between them.
NISCHAL GURUNG 34
Cutting-edge it solution
1. Mesh Topology
Every device within the network is directly connected to each other device through
individual and dedicated point-to-point links is called Mesh topology. When we say
dedicated, it means that the link only carries data for the two connected devices only. Let’s
say we have devices in the network then each device must be connected with(n-1) devices of
the network. Number of links in a mesh topology of n devices would be n(n-1)/2. ((Alpern
and Shimonski, 2010)
Advantages:
Mesh topology is reliable and robust network.
It is secure because there is a point-to-point link thus unauthorized access is not
possible.
Fault detection is easy.
Disadvantages:
Huge number of wires are required to connect each system and it is tedious and
headache.
Each device needs to relate to other devices; number of 1/0 ports required must be
huge.
Scalability issues because a device cannot relate to large number of devices with a
dedicated point to point link.
2. Star Topology
In star topology each device in the network is connected to central device called hub. Unlike
Mesh topology, star topology doesn’t allow direct communication between devices, a device
must have to communicate through hub. If anyone device which wants to send data to other
NISCHAL GURUNG 35
Cutting-edge it solution
device, it has to first send the data to hub and then the hub transmits that data to the
designated device.
3. Bus Topology
In bus topology there is main cable, and all the devices are connected to this main cable
through drop lines. There is a device called tap that connects the drop line to the main cable.
Since all the data is transmitted over the main cable, there is a limit of drop lines and the
distance a main cable can have.
NISCHAL GURUNG 36
Cutting-edge it solution
Advantages:
Easier to install.
Less cables are required than Mesh and Star topology.
Disadvantages:
Difficult to find the fault.
A limit of how many nodes you can connect with backbone cable.
4. Ring Topology:
In ring topology each device is connected with the two devices on either side of it. There are
two dedicated point to point links a device has with the devices on either side of it. This
structure forms a ring thus it is known as ring topology.
NISCHAL GURUNG 37
Cutting-edge it solution
Advantages:
Easy to install.
Managing is easier as to add or remove a device from the topology.
Disadvantages:
A link failure can fail the entire network as the signal will not travel forward due to
failure.
Data traffic issues, since all the data is circulating in a ring,
Hybrid Topology
A combination of two or more topology is known as hybrid topology. For example, a
combination of star and mesh topology is known as hybrid topology.
NISCHAL GURUNG 38
Cutting-edge it solution
Benefits:
We can choose the topology based on the requirement.
Scalable as we can further connect other computer networks with the existing
networks with different topologies.
Cons:
Fault detection is difficult.
Installation is difficult.
Design is complex so maintenance is high thus expensive.
Tree Topology:
Tree Topology is a type of network topology that consists of a tree structure where all the
devices are connected to one another in a hierarchical structure resembling like a tree. Bus
and star topology are combined to form a tree topology.
NISCHAL GURUNG 39
Cutting-edge it solution
Advantages:
It has the characteristics of both bus and star topology.
Finding errors is simple.
Network can be easily enlarged.
Disadvantages:
Due to size, maintenance and configuration are hard.
Security is very poor.
It has high cost.
NISCHAL GURUNG 40
Cutting-edge it solution
Overview:
As I have discussed about all topology with its advantages and disadvantages by comparing
all Here, I have used star topology for Cutting Edge IT solution because it is mostly
commonly used topology for the network, and it can manage the entire network from one
location and flexibility, reliability, cost efficient, performance, security etc. with these
advantages we can perform every task in the Company without having problems. Our
network can be easily monitored and troubleshoot which can be easily established and
improve network performance with minimum network traffic. If any of the computers fail to
operate then the whole star network will not be affected and there is no disruption to the
network connecting or removing parts. So, I would like to use and prefer star topology for the
new branch.
Network Protocol
HTTP is a layer that is designed for moving a hypertext between two or more
systems.
DHCP is a protocol for network management and used for automating the process of
configuring devices on IP networks.
TLS is a protocol which is designed for data security and privacy over the internet.
NISCHAL GURUNG 41
Cutting-edge it solution
Overview
With the use of networking principles i.e., OSI model and TCP/IP model all the protocols in
different layers are used for smooth communication between sender and receiver.
Networking Devices
Networking devices are the hardware devices which are used to connect computers, printers,
fax machines and other electronic devices to a network. These devices transfer data in a fast,
secure, and correct way over same or different networks.
1. Switch
A switch is a networking device operating at layer 2 that connects devices within a local area
network. It interchanges the data packets between devices on the same network.
2. Router
A router is a network layer hardware device that transmits data from one LAN to another if
both networks support the same set of protocols. So, a router is typically connected to at least
two LANs and internet service provider.
3. Hub
A hub is a physical layer networking device which is used to connect multiple devices in a
network. They are generally used to connect computers in a LAN.
4. Firewall
A system which is designed to protect an intranet from unauthorized access is called Firewall.
They are the first line of defense against unauthorized access to private networks. They can
be used effectively against virus, trojan or worm attacks.
NISCHAL GURUNG 42
Cutting-edge it solution
5. Server
A server is a software or hardware device that accepts and responds to requests made over a
network. The device that makes the request and receives a response from the server is called
a client.
6. Workstation (PC)
A workstation is a high-performance computer system specifically designed for individual
use, boasting advanced graphics capabilities, ample storage capacity, and a robust central
processing unit (CPU).
Additionally, the networking software integrated into the workstation's setup assumes a
critical role by facilitating seamless connectivity and effective communication not only
among workstations within the network but also with other peripheral devices and external
networks. This networking software plays a vital role in enabling collaborative efforts among
users, resource sharing, and the swift and secure movement of data within the network
environment.
NISCHAL GURUNG 43
Cutting-edge it solution
Overview:
I have used client operating system for the new branch in Butwal because it works within
computer and other portable devices and support wide range of applications.
NISCHAL GURUNG 44
Cutting-edge it solution
Server Configuration
NISCHAL GURUNG 45
Cutting-edge it solution
Task 2
Network Design
Network design is the practice of planning and designing a communications network.
Network design includes things like network analysis, IP addressing, hardware selection, and
implementation planning.
NISCHAL GURUNG 46
Cutting-edge it solution
Device Requirements
NISCHAL GURUNG 47
Cutting-edge it solution
Overview
To make cisco network I have used devices which are mentioned in above table with cost.
With this design and those devices makes the performance smooth and secured for our
network system which is created for the new branch in Butwal of Cutting Edge It Solution.
1. VTP
NISCHAL GURUNG 48
Cutting-edge it solution
2. VLAN
3. DHCP
NISCHAL GURUNG 49
Cutting-edge it solution
4. HTTP
NISCHAL GURUNG 50
Cutting-edge it solution
5. DNS
NISCHAL GURUNG 51
Cutting-edge it solution
6. EMAIL
NISCHAL GURUNG 52
Cutting-edge it solution
7. FTP
NISCHAL GURUNG 53
Cutting-edge it solution
8. ROUTING
NISCHAL GURUNG 54
Cutting-edge it solution
NISCHAL GURUNG 55
Cutting-edge it solution
2. Firewall
NISCHAL GURUNG 56
Cutting-edge it solution
Result,
NISCHAL GURUNG 57
Cutting-edge it solution
Result:
NISCHAL GURUNG 58
Cutting-edge it solution
Result,
Result:
NISCHAL GURUNG 59
Cutting-edge it solution
NISCHAL GURUNG 60
Cutting-edge it solution
Results:
NISCHAL GURUNG 61
Cutting-edge it solution
Result,
NISCHAL GURUNG 62
Cutting-edge it solution
NISCHAL GURUNG 63
Cutting-edge it solution
2. For the installation of the server from a .iso file. Here we need to install
Server2012R2 then go to create a new virtual machine and set the minimum
required hard disk to 30 GB and RAM 4GB.
NISCHAL GURUNG 64
Cutting-edge it solution
NISCHAL GURUNG 65
Cutting-edge it solution
NISCHAL GURUNG 66
Cutting-edge it solution
NISCHAL GURUNG 67
Cutting-edge it solution
NISCHAL GURUNG 68
Cutting-edge it solution
NISCHAL GURUNG 69
Cutting-edge it solution
4.
5. Now we need to add active directory. Firs of all open server manager and click on
‘Local Server’. After that go to ‘Manage’ menu and select ‘Add Roles and Features’.
6. Click next and next and then select active directory from add roles windows.
NISCHAL GURUNG 70
Cutting-edge it solution
7. Select the restart option, if necessary, as option and then press install button.
8. After complete installation of Active Directory, you need to click on ‘promote this
server to Domain Controller’.
NISCHAL GURUNG 71
Cutting-edge it solution
9. Select ‘Add a new forest’ from deployment configuration windows and write domain
name as cuttingedge.com
NISCHAL GURUNG 72
Cutting-edge it solution
NISCHAL GURUNG 73
Cutting-edge it solution
11. Click the next and again click on next to check NetBIOS name (Capital letters will
come automatically) then click next
12. So, to check the Path, Review and Prerequisites you need to press next and proceed to
install.
NISCHAL GURUNG 74
Cutting-edge it solution
NISCHAL GURUNG 75
Cutting-edge it solution
13. For changing IP address in client, you need to go to Network and setting which
changes adapter and then select Ethernet and right click. And from there select the
properties where you will find IPV4 and click it and select properties. After that
change the IP to 172.168.10.2, Subnet mask 255.255.255.240, Default Gateway to
172.168.10.1 and Preferred DNS as 172.168.10.10.
14. Check whether the connection is established or not in client side where you can also
check ping from the server IP address.
NISCHAL GURUNG 76
Cutting-edge it solution
16. After pining you need to go to tools for active Directory user and computers and then
select user folder. From there right click and create users. Create username it1, it2,
hr1, sales2 and fin1 for demo. Create group as admin rights and read rights. When
creating user, we need to give password to user which will be using to access the user
from client operating system. Assigning the it1 and it2 as users in admi rights and hr1,
sales1 and fin1 in read rights.
NISCHAL GURUNG 77
Cutting-edge it solution
NISCHAL GURUNG 78
Cutting-edge it solution
NISCHAL GURUNG 79
Cutting-edge it solution
NISCHAL GURUNG 80
Cutting-edge it solution
17. Go to client server and change the domain name from This PC to “Cuttingedge.com”.
Then we get prompt to shut down the client. While logging in, provide the user’s
name and password which we have created. Once logged in, run the command, and
provide \\177.168.10.10. (Server Ip). After that we can open server successfully and
now we can transfer the files and folder there and it shall be updated to server and
other users.
NISCHAL GURUNG 81
Cutting-edge it solution
NISCHAL GURUNG 82
Cutting-edge it solution
18. Now we need to add Web Server (IIS) to access website. Open server manager and
click on local server and move to manage menu and select add role and features.
Select Webserver (IIS) and enter next. Then you can select the features you want to
give and install. Here we need to select FTP.
NISCHAL GURUNG 83
Cutting-edge it solution
19. Go to tools and select IIS Manager from the list, after that Internet Information
Service Manager dialog box will open then go to sites and right click it and add a new
website with all the details.
NISCHAL GURUNG 84
Cutting-edge it solution
20. In client server go to it1 and open web browser and type domain name cutting.com. It
should open the page.
NISCHAL GURUNG 85
Cutting-edge it solution
21. Create a folder named FTP in C drive and right click on it. When right click on folder
go to security and select advance. Then select disable permission and remove the
users group. After that click on and select principle then add group (adminrights and
readrights) for permission. Give full permission to adminrights group and readrights
group to only rights.
NISCHAL GURUNG 86
Cutting-edge it solution
22. Go to IIS manager and right click on site and add an FTP server and provide FTP
server name and provide path of folder which we have created i.e., c:\FTP. Bind FTP
with ip and select no ssl certificate. After that select basic and select specified roles
and group in allow access to add adminrights group name and read with permission.
NISCHAL GURUNG 87
Cutting-edge it solution
NISCHAL GURUNG 88
Cutting-edge it solution
24. Now go to C drive and then create a folder with FTPreadonly and right click in the
file sharing which provide read only to hr1, sales1 and finance and provide read and
write features to it1 and it2.
NISCHAL GURUNG 89
Cutting-edge it solution
NISCHAL GURUNG 90
Cutting-edge it solution
25. Here on client machine, it has already open \\172.168.10.10 in run. Access the server
and folder with the name ftpreadonly then create a folder as ITuserfolder and log out
from the system. Instead of using it1 and it2, use hr1, fin1 or sales to login again.
After that type \\172.168.10.10 and run it. After running try to create another folder
inside ftpreadonly then you will get a message like “Permission Denied”.
NISCHAL GURUNG 91
Cutting-edge it solution
NISCHAL GURUNG 92
Cutting-edge it solution
Maintenance Schedule:
Gantt Chart:
NISCHAL GURUNG 93
Cutting-edge it solution
Testing and evaluating the design to meet the requirements and analyzing user
feedback:
NISCHAL GURUNG 94
Cutting-edge it solution
NISCHAL GURUNG 95
Cutting-edge it solution
Software
Software plays powerful role in forming the group of organization. Including all the MS word
office can also be enhanced as last office consists advanced features suits for the sky
rocketing development environment.
Security
Security is provided to our network components through a VLAN which I used on logical
connection of workstations, servers, and network computers that tend to be on the same Local
Area Network (LAN) regarding their geographical separation. In a summary, hardware on the
same VLANs allows traffic between equipment to be independent and more reliable. For the
consideration for the development of future purpose there will be many operating system,
hardware devices and more VLAN protection.
Server:
A server is a software or hardware entity responsible for receiving and processing requests
from devices connected to a network. The devices that initiate these requests and receive
responses from the server are referred to as clients. Typically, the term "server" specifically
pertains to the computer system that accepts requests for web files and transmits the
requested files back to the clients. There are manly two types of servers i.e.
1. Physical Server
2. Logical Server
Physical Server:
A physical Server is also referred to as a ‘bare-metal-server’ which means that a specific
physical server is designated to a single user. The server is large in size due to huge and
powerful processing components. Different types of servers are:
Tower Server
NISCHAL GURUNG 96
Cutting-edge it solution
Tower servers seem dated and look more like desktops than servers, tower servers are
probably found more often in smaller environments than anywhere else because it can take up
a lot of space and are tough to physically manage since you can't easily stack them on one
another.
Rack Server
Rack servers are extremely common and these racks along with other critical data center
equipment such as backup batteries, switches, and storage arrays.
Blade Server:
A blade server is a compact and energy-efficient server computer designed with a modular
structure to optimize space utilization.
Logical Server:
Logical server is also referring to as virtual server that runs on virtualized software which
shares the resources of physical server. Some of logical server used in logical server are as
follow:
File Server:
The file server is a networking device that plans to store, manage, and share files and data
within the range of a network. It provides a concentrate storage location for storing data and
files from one computer or any other devices which are connected to the network.
Print Server:
Print server allows shared access printers and mostly use LAN operating systems to provide
printing service to all the pcs in the company. Its main objective is to centralize print
resources and open up access to printers for a variety of network users or devices.
Network Server:
A network server is a special computer connected to internet users across the world for
sharing of information. The server is built with high quality component and is stored in data
center, to ensure better internet connectivity.
Application Server:
Application Server is a type of server designed to install, operate, and host applications. In
the early days of application servers, there was a huge growth in the number of applications
brought to the Internet.
NISCHAL GURUNG 97
Cutting-edge it solution
Database Server:
A database server is a server which uses a database application that provides database
services to other computer programs or to computers, as defined by the client–server model,
the database engine does all the selecting, sorting, and updating.
Email Server:
An email server is a application which is used for sending, receiving, and storing messages. It
helps to function email communication by managing the flow of email traffic between sender
and client by ensuring that the message is delivered to the intended receiver.
NISCHAL GURUNG 98
Cutting-edge it solution
Overview:
So, here I have selected blade server for new branch in Butwal because it can provide all the
needed connection for the company. A blade server generally has much less cable than tower
or rack server since a lot of the connectivity is handled internally. heat. From a cost
perspective, blade servers require some initial infrastructure, such as the chassis, so the
upfront cost is often higher than for servers of other types, but it can be maintained and
monitored easily through a single interface which makes the business run smoothly and it is
also used in Cutting Edge IT Solution branch located at Butwal.
NISCHAL GURUNG 99
Cutting-edge it solution
isolated. It is simple to access, understand, and installation at a low cost, and it gives a brief
operation to repair the trouble and growth the capacity to deal with complex routing protocol.
For the effectiveness of complete network system, I actually have completed checking out of
DHCP, DNS, Email, Telnet, Routing, and VPN. I have tested all the necessary steps to make
it better and reliable. First, I have configured in lower level later on I have changed into
higher level to make performance of the device better.
References:
GeeksforGeeks. (2020). What is P2P Peer to Peer Process. [online] Available at:
https://www.geeksforgeeks.org/what-is-p2ppeer-to-peer-process/ [Accessed 17 Jul. 2023].
Computer Science GCSE GURU. (2019). Client-Server Networks - Computer Science GCSE
GURU. [online] Available at: https://www.computerscience.gcse.guru/theory/client-server-
networks [Accessed 17 Jul. 2023].
VMware. (2023). What is Cloud Architecture? | VMware Glossary. [online] Available at:
https://www.vmware.com/topics/glossary/content/cloud-architecture.html [Accessed 17 Jul.
2023].
Arley, A. (2021). Network standards and devices - Alan Arley - Medium. [online] Medium.
Available at: https://medium.com/@alan6arley/network-standards-and-devices-
1bf99da95b05 [Accessed 21 Jul. 2023].
Alpern, N.J. and Shimonski, R.J. (2010). Network Fundamentals. [online] pp.1–18. doi:
https://doi.org/10.1016/b978-1-59749-428-1.00003-5.