Cutting Edge IT Solution Networking

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 100

Cutting-edge it solution

INTERNATIONAL SCHOOL OF
MANAGEMENT AND TECHNOLOGY

FACULTY OF COMPUTING

ASSIGNMENT COVER SHEET


This form is to be completed by students submitting assignments of level 4 and level
5. Students are required to complete all sections and attach to your assignment.

STUDENT DETAILS
Nischal Gurung
STUDENT NAME

STUDENT ID

UNIT AND ASSIGNMENT DETAILS

UNIT TITLE Networking

UNIT NUMBER M/618/7393

ASSIGNMENT Cutting Edge IT Solution Network System


TITLE

ISSUE DATE 15/05/2023 DUE DATE 21/07/2023

ASSESSOR Elu Chhetri Pandey


NAME

ESTIMATED 8000
WORD LENGTH

SUBMISSION

HAND IN DATE 21/07/202

NISCHAL GURUNG 1
Cutting-edge it solution

DECLERATION AND ACKNOWLEDGEMENT


When submitting assignments, each student must sign a declaration
confirming that the work is their own.

Plagiarism and Collusion


Plagiarism: to use or pass off as one’s own, the writings or ideas of
another without acknowledging or crediting the source from which the ideas
are taken.

Collusion: submitting an assignment, project or report completed by


another person and passing it off as one’s.

In accordance with the Academic Integrity and Plagiarism Policy:

1. I declare that:
a) this assignment is entirely my own work, except where I have included
fully-documented references to the work of others,
b) the material contained in this assignment has not previously been
submitted for any other subject at the University or any other educational
institution, except as otherwise permitted,
c) no part of this assignment or product has been submitted by me in another
(previous or current) assessment, except where appropriately referenced,
and with prior permission from the Lecturer / Tutor / Unit Coordinator for
this unit.

2. I acknowledge that:
a) if required to do so, I will provide an electronic copy of this assignment to
the assessor;
b) the assessor of this assignment may, for the purpose of assessing this
assignment:
I. reproduce this assignment and provide a copy to another member
of academic staff;
II. communicate a copy of this assignment to a plagiarism checking
service such as Plagiarism Check (which may then retain a copy of
this assignment on its database for the purpose of future plagiarism
checking).

NISCHAL GURUNG 2
Cutting-edge it solution

I am aware of and understand that any breaches to the Academic Code of Conduct
will be investigated and sanctioned in accordance with the College Policy.

SIGNATURE Nischal DATE 21/07/2023

NISCHAL GURUNG 3
Cutting-edge it solution

Preface:
Computer networks have become an essential component of contemporary civilization in the
fast-evolving technology landscape of today, revolutionizing the ways in which we interact,
cooperate, and access information. A wide and linked web of communication has been
created by the seamless integration of devices and systems, enabling the sharing of
information and resources on a global scale. This thorough book seeks to provide a clear and
in-depth explanation of the underlying concepts, principles, and components that underlie
these complex systems as we dig into the realm of computer networks.

NISCHAL GURUNG 4
Cutting-edge it solution

Table of Contents
Preface:...................................................................................................................................4

Introduction..........................................................................................................................10

Objective:.............................................................................................................................10

Scope....................................................................................................................................11

Task 1...................................................................................................................................12

Computer Networking..........................................................................................................12

Physical Network.................................................................................................................12

1. Personal Area Network (PAN):....................................................................................13

Advantages of PAN:............................................................................................................14

Disadvantages of PAN.........................................................................................................14

2. Local Area Network (LAN)..........................................................................................15

Advantages:..........................................................................................................................15

Disadvantages of LAN:........................................................................................................15

3. Wide Area Network:.....................................................................................................16

Benefits:...............................................................................................................................17

Cons:....................................................................................................................................17

Metropolitan Area Network (MAN):...................................................................................18

Benefits:...............................................................................................................................18

Cons:....................................................................................................................................19

Logical Network:.................................................................................................................19

1. Peer to Peer Network:...................................................................................................19

‌Advantages:..........................................................................................................................20

Disadvantage:.......................................................................................................................20

2. Client Server Network:.................................................................................................20

Advantages:..........................................................................................................................21

Disadvantages:.....................................................................................................................21

NISCHAL GURUNG 5
Cutting-edge it solution

3. Cloud Network Architecture:........................................................................................21

Advantages:..........................................................................................................................22

Disadvantages:.....................................................................................................................22

Overview:.............................................................................................................................22

Transmission Medium:.........................................................................................................23

1. Wired Network:.............................................................................................................23

Benefits:...............................................................................................................................23

Constraints:..........................................................................................................................24

2. Wireless Network:.........................................................................................................24

Advantages:..........................................................................................................................24

Disadvantages:.....................................................................................................................24

3. Hybrid Network:...........................................................................................................24

Benefits:...............................................................................................................................24

Cons:....................................................................................................................................24

Overview:.............................................................................................................................26

Network Standard:...............................................................................................................26

OSI Model:...........................................................................................................................28

1. Physical Layer...............................................................................................................28

2. Data link layer...............................................................................................................29

3. Network Layer..............................................................................................................29

4. Transport Layer.............................................................................................................29

5. Session Layer................................................................................................................29

6. Presentation Layer.........................................................................................................29

7. Application Layer..........................................................................................................30

Advantages of OSI Model:...................................................................................................31

Disadvantages of OSI Model:..............................................................................................31

TCP/IP..................................................................................................................................31

NISCHAL GURUNG 6
Cutting-edge it solution

Advantages of TCP/IP:........................................................................................................31

Disadvantages of TCP/IP:....................................................................................................32

IEEE Standard:.....................................................................................................................32

Overview:.............................................................................................................................33

Network Topology:..............................................................................................................33

Logical Topology:................................................................................................................33

Physical Topology:...............................................................................................................34

Different types of network topology are as follows:............................................................34

1. Mesh Topology.............................................................................................................34

Advantages:..........................................................................................................................34

Disadvantages:.....................................................................................................................35

2. Star Topology................................................................................................................35

Advantages of Star Topology...............................................................................................35

Disadvantages of Star Topology..........................................................................................35

3. Bus Topology................................................................................................................36

Advantages:..........................................................................................................................36

Disadvantages:.....................................................................................................................36

4. Ring Topology:.............................................................................................................36

Advantages:..........................................................................................................................37

Disadvantages:.....................................................................................................................37

Hybrid Topology..................................................................................................................37

Benefits:...............................................................................................................................38

Cons:....................................................................................................................................38

Tree Topology:.....................................................................................................................38

Advantages:..........................................................................................................................39

Disadvantages:.....................................................................................................................39

Communication and Bandwidth:..........................................................................................40

NISCHAL GURUNG 7
Cutting-edge it solution

Network topology impact on Communication and Bandwidth:..........................................40

Overview:.............................................................................................................................40

Network Protocol.................................................................................................................40

Overview..............................................................................................................................41

Networking Devices.............................................................................................................41

1. Switch............................................................................................................................41

2. Router............................................................................................................................41

3. Hub................................................................................................................................41

4. Firewall.........................................................................................................................41

5. Server............................................................................................................................42

6. Workstation (PC)..........................................................................................................42

Workstation hardware dependence and the relevant networking software..........................42

Server Operating System:....................................................................................................42

Client Operating System:.....................................................................................................42

Overview:.............................................................................................................................43

Client Computer Configuration............................................................................................43

Server Configuration............................................................................................................44

Task 2...................................................................................................................................45

Network Design...................................................................................................................45

Physical Diagram of Network System.................................................................................45

Logical Design of the network:............................................................................................46

IP Sheet:...............................................................................................................................46

Device Requirements...........................................................................................................46

Overview..............................................................................................................................47

Implement a networked system based on a prepared design structure design.....................47

1. VTP...............................................................................................................................47

2. VLAN............................................................................................................................48

NISCHAL GURUNG 8
Cutting-edge it solution

3. DHCP............................................................................................................................48

4. HTTP.............................................................................................................................49

5. DNS...............................................................................................................................50

6. EMAIL..........................................................................................................................51

7. FTP................................................................................................................................52

8. ROUTING.....................................................................................................................53

9. Wireless Connection in Laptop.....................................................................................54

Implementation of Telnet and Firewalls for security...........................................................54

1. TELNET........................................................................................................................54

2. Firewall.........................................................................................................................55

Analyze test results against expected results:......................................................................56

Result,...................................................................................................................................56

Result:..................................................................................................................................57

Result,...................................................................................................................................58

Results:.................................................................................................................................60

Result,...................................................................................................................................61

To being Configurating Admin and User in Virtual MWare:..............................................62

1. Start by running the download VMware installation file. This will initiate the VMware
workstation Pro installation process.....................................................................................62

2. For the installation of the server from a .iso file. Here we need to install Server2012R2
then go to create a new virtual machine and set the minimum required hard disk to 30 GB
and RAM 4GB.....................................................................................................................63

Maintenance Schedule:........................................................................................................91

Gantt Chart:..........................................................................................................................91

Testing and evaluating the design to meet the requirements and analyzing user feedback: 91

Network system Potential Enhancement:.............................................................................93

Hardware..............................................................................................................................93

NISCHAL GURUNG 9
Cutting-edge it solution

Software...............................................................................................................................93

Security................................................................................................................................94

Server:..................................................................................................................................94

Physical Server:....................................................................................................................94

Logical Server:.....................................................................................................................95

File Server:...........................................................................................................................95

Print Server:.........................................................................................................................95

Network Server:...................................................................................................................95

Application Server:..............................................................................................................95

Database Server:...................................................................................................................95

Email Server:........................................................................................................................95

Overview:.............................................................................................................................96

Evaluating critical reflection and justifying valid conclusions............................................97

References:...........................................................................................................................98

NISCHAL GURUNG 10
Cutting-edge it solution

Introduction
Cutting Edge IT solution is an appreciated and trustworthy IT service which provide IT
services to the customers which is situated in Kathmandu. The organization has recently
made the strategic decision to establish a new branch in Butwal, aiming to extend its
reach and offer cutting-edge technology devices and applications to the general
public. As the newly appointed IT officer in the IT Department, my primary
responsibility entails planning, managing, designing, developing, and optimizing the
networking system for this expansion. I am entrusted with the crucial task of
creating a seamless and efficient network infrastructure to support the organization's
operations and deliver a seamless experience to both staff and customers at the new
branch.

Objective:
 To create optimized network system.
 To deploy and troubleshoot network system.
 Analysing network equipment, principles, their protocols, and functions.

Scope
With the help of various department, its ultimate goal is to provide a secure, efficient, and
reliable network ensuring network security and performance.

NISCHAL GURUNG 11
Cutting-edge it solution

Task 1
Computer Networking
As per (Spiceworks, 2023) A network is nothing more than two or more computers connected
by a cable or by a wireless radio connection so that they can exchange information. Of
course, computers can exchange information in ways other than networks. Most of us have
used what computer nerds call the sneakernet. That’s where you copy a file to a flash drive or
other portable storage device and then walk the data over to someone else’s computer.

Now, let’s see some of the types of networks available:

1. Physical Network
2. Logical Network

Slide 1
Physical Network
Physical Network refers to how the components of a network are organized and connected. It
involves the arrangement of network devices and the physical cables that connect them. Some
of the physical networks are as follows:

NISCHAL GURUNG 12
Cutting-edge it solution

Slide 2

1. Personal Area Network (PAN):


Personal Area Network is a computer network formed around a person. It generally consists
of a computer, mobile, or personal digital assistant. PAN can be used for establishing
communication among these personal devices for connecting to a digital network and the
internet.

NISCHAL GURUNG 13
Cutting-edge it solution

Fig: PAN Network

Advantages of PAN:
Here are some of the important benefits of PAN network:

 PAN networks are relatively secure and safe.


 It offers only short-range solution up to 10 meters.
 Strictly restricted to a small area.

Disadvantages of PAN
 It may establish a bad connection to other networks at the same radio bands.
 Distance limits.

NISCHAL GURUNG 14
Cutting-edge it solution

2. Local Area Network (LAN)


A Local Area Network (LAN) is a collection of computers and related devices that are
interconnected in a small space, such as building for an office or school. It is a widely useful
network for sharing resources like files, printers, games, and other applications. The simplest
type of LAN network is to connect computers and a printer in someone's home or office. In
general, LAN will be used as one type of transmission medium. It is a network which consists
of less than 5000 interconnected devices across several buildings.

Fig: LAN Network

Advantages:
 Computer resources like hard-disks, DVD-ROM, and printers can share local area
networks. This significantly reduces the cost of hardware purchases.
 You can use the same software over the network instead of purchasing the licensed
software for each client in the network.
 Data of all network users can be stored on a single hard disk of the server computer.
 You can easily transfer data and messages over networked computers.
 It will be easy to manage data at only one place, which makes data more secure.
 Local Area Network offers the facility to share a single internet connection among all
the LAN users.
Disadvantages of LAN:
 LAN will indeed save cost because of shared computer resources, but the initial cost
of installing Local Area Networks is quite high.

NISCHAL GURUNG 15
Cutting-edge it solution

 The LAN admin can check personal data files of every LAN user, so it does not offer
good privacy.
 Unauthorized users can access critical data of an organization in case LAN admin is
not able to secure centralized data repository.
 Local Area Network requires a constant LAN administration as there are issues
related to software setup and hardware failures.

3. Wide Area Network:


WAN (Wide Area Network) is another significant computer network that is spans across a
big geographical area. WAN network system could be a connection of a LAN which connects
with other LAN's using telephone lines and radio waves. It is mostly limited to an enterprise
or an organization.

NISCHAL GURUNG 16
Cutting-edge it solution

Fig: WAN Network

Benefits:
 WAN helps you to cover a larger geographical area. Therefore, business offices
situated at longer distances can easily communicate.
 Contains devices like mobile phones, laptop, tablet, computers, gaming consoles, etc.
 WLAN connections work using radio transmitters and receivers built into client
devices.
Cons:
 The initial setup cost of investment is very high.

NISCHAL GURUNG 17
Cutting-edge it solution

 It is difficult to maintain the WAN network. You need skilled technicians and
network administrators.
 There are more errors and issues because of the wide coverage and the use of different
technologies.
 It requires more time to resolve issues because of the involvement of multiple wired
and wireless technologies.
 Offers lower security compared to other types of networks in computer.

Metropolitan Area Network (MAN):


A Metropolitan Area Network or MAN is consisting of a computer network across an entire
city, college campus, or a small region. This type of network is larger than a LAN, which is
mostly limited to a single building or site.

Fig: MAN Network

Benefits:
 It offers fast communication using high-speed carriers, like fiber optic cables.
 It provides excellent support for an extensive size network and greater access to
WANs.
 The dual bus in MAN network provides support to transmit data in both directions
concurrently.
 A MAN network mostly includes some areas of a city or an entire city.

Cons:
 You need more cable to establish MAN connection from one place to another.

NISCHAL GURUNG 18
Cutting-edge it solution

 In MAN network it is tough to make the system secure from hackers

Logical Network:
A logical network is a representation of a network that, though it may actually be a portion of
a larger or local area network, gives users the idea that it is autonomous and isolated.

Slide 3

1. Peer to Peer Network:


(GeeksforGeeks, 2021) This kind of network consists of two or more computers linked
together without the requirement of a file server. In order to transfer or share files directly
with one another, two persons in the same room can create a peer-to-peer network by
temporarily connecting their computers together via a Universal Serial Bus. It can also
include a more permanent network where say half-a-dozen computers in a small office are
connected together with copper cables.

NISCHAL GURUNG 19
Cutting-edge it solution

‌Advantages:
 This network is easier to set up.
 It is less expensive.
 All nodes act as server as well as client therefore no need of dedicated server.

Disadvantage:
 Computer can be accessed anytime.
 Network security must be applied to each computer separately.
 Backup must be performed on each computer separately.

2. Client Server Network:


According to (Computer Science GCSE GURU, 2019) Client server network is such model
where one side server machine delivers the various services to other side client machine for
grabbing those services. So this type of model is known as the “Client-Server In this network,
entire network is controlled by centralized powerful computer; it is called the “Server“.

NISCHAL GURUNG 20
Cutting-edge it solution

Fig: Client Server Network

Advantages:
 Users can access all data anytime and anywhere.
 The size can be expanded as per the requirement.
 It is capable to bear massive usage.

Disadvantages:
 It needs special network operating system.
 Its more expensive
 Well qualified technical staffs are required for maintaining the server.

3. Cloud Network Architecture:


As per (VMware, 2023) Cloud Network Architecture is the method where different
components of technologies are merged to form a cloud, in which resources are collected
through virtualized technology and transferred across a network.

NISCHAL GURUNG 21
Cutting-edge it solution

Fig: Cloud Network Architecture

Advantages:
 They provide flexibility and manage wide range of services.
 It is cost efficient.
 It provides robust security and have data durability.

Disadvantages:
 It relies on internet if there is any disturbance than it can affect the performance of
cloud services.
 Cloud consumers have little control over the underlying operations and service
delivery because ownership and management of the infrastructure are transferred to
the service provider.

Overview:
Here, I have used Client- Server networking for logical network for managing, performance,
scalability, security, resources, and availability. With this server, the company can deliver the

NISCHAL GURUNG 22
Cutting-edge it solution

various services to other side client machine for grabbing those services. And I have used
LAN and MAN as physical network because it can connect large amount of location server
and the company of Butwal connect small number of areas where it can provide high speed
data transfer, security, cost efficient, reliable and performance. And if the network in near
future expands then it can also provide better services to clients.

Transmission Medium:
A transmission medium is a physical connection or pathway through which data is
transmitted from one to other devices in a network. There are 3 types of transmission media
used in networking:

Slide 4

1. Wired Network:
A Wired Network is a type of network architecture where devices are interconnected through
physical cable to transmit the data signals providing a reliable and consistent means of
communication.

Here are some of the Benefits of wired network.

Benefits:
 Wired network is more stable and reliable then wireless network.
 It provides high speed data where large file can be transferred fast.

NISCHAL GURUNG 23
Cutting-edge it solution

 It provides best security for data transfer because data is transmitted through physical
cable, and it is harder to intercept.
Constraints:
 It requires cables to connect which make difficult to move around.
 For installing it requires proper planning and management.

2. Wireless Network:
A wireless network is the process of transferring the data, communicating with devices
without the need of physical cables.

Advantages:
 Wireless network can be easily accessed anywhere within the range of network.
 It is easy to install.
 It is cost efficient.
 It provides fast speed of transferring data.

Disadvantages:
 Network can be accessed without authorization.
 It has limited range of speed.

3. Hybrid Network:
Hybrid Network is a type of network that connects both wired and wireless elements to form
a combined network.

Benefits:
 It provides flexible high-speed connection to access network and resources.
 Organizations can ensure backup connectivity and maintenance.

Cons:
 This network is expensive.
 It is very complex.

NISCHAL GURUNG 24
Cutting-edge it solution

NISCHAL GURUNG 25
Cutting-edge it solution

Overview:
I have chosen hybrid network as transmission medium of networks because it includes both
wired and wireless network which provide wide range of benefits, flexibility, mobility, and
adaptability for organizations. With these advantages it makes organizations run smoothly to
establish robust, adaptable and network infrastructure.

Network Standard:
A standard is an agreed-upon definition of a protocol. As a result, we couldn’t easily mix
equipment from different manufacturers on a single network. Then along came standards to
save the day. Hurrah! Because standards are industry-wide protocol definitions not tied to a
particular manufacturer, you can mix and match equipment from different vendors. As long
as the equipment implements the standard protocols, it should be able to coexist on the same
network. (Arley, 2021)

Slide 5

NISCHAL GURUNG 26
Cutting-edge it solution

Slide 6

Slide 7

NISCHAL GURUNG 27
Cutting-edge it solution

Slide 8

OSI Model:
The OSI model, also known as the Open Systems Interconnection Reference Model, is a
conceptual framework that organizes the various aspects of a computer network into seven
discrete layers. These layers can be likened to the layers of an onion, where each layer wraps
around and conceals the complexities of the layer beneath it. However, comprehending the
intricacies of the OSI model can be a demanding task, much like the act of peeling back
layers of an onion that can lead to tears. Unlike Ethernet and TCP/IP, which are specific
networking standards, the OSI model serves as a framework that accommodates various
networking standards. It outlines which aspects of a network's operation can be addressed by
different network standards. Here are the seven layers of OSI Model, given bellow:

1. Physical Layer
It is the layer that deals with the physical components of the network infrastructure. It
includes things like connectors, cable length restrictions, and other physical properties as well
as the cables used for connectivity. For instance, the electrical characteristics of twisted-pair
cables, the requirements for connections, the maximum cable length, and more are all
specified in the Ethernet standard for 10BaseT cable. Physical layer applications include star,
bus, ring, and mesh network topologies.

NISCHAL GURUNG 28
Cutting-edge it solution

2. Data link layer


In the OSI architecture, the data connection layer, which is below higher levels, gives
meaning to the sent bits. It includes data link protocols that deal with a variety of issues,
including as determining packet sizes, addressing packets to assure appropriate delivery, and
using collision avoidance techniques to stop several nodes from transmitting data at once. In
essence, the data connection layer adds organization and management to the data flow
through the network.

3. Network Layer
The network layer is responsible for routing. network messages between computers. The
network layer, which corresponds to layer 3 of the OSI model, is closely linked with specific
protocols. Among these, the most widely utilized are IP (Internet Protocol) in conjunction
with TCP (Transmission Control Protocol), and IPX (Internetwork Packet Exchange) paired
with SPX (Sequenced Packet Exchange), which are commonly employed in Novell and
Windows networks. These layer 3 protocols facilitate the transmission of data across
networks by handling addressing and routing functions.

4. Transport Layer
The transport layer is the layer to find two of the most well-known networking protocols i.e.,
TCP (typically paired with IP) and SPX (typically paired with IPX). The transport layer is
concerned with the transportation of information from one computer to anoth```````er.

5. Session Layer
The session layer establishes conversations sessions between networked devices. A session is
an exchange of connection-oriented transmissions between two network devices. Each
transmission is handled by the transport layer protocol. The session itself is managed by the
session layer protocol. A single session can include many exchanges of data between the two
computers involved in the session.

6. Presentation Layer
2020)The presentation layer is responsible for how data is represented to applications. The
most common representation for representing character data today is called UTF-8, which
uses 8-bit sets to represent most characters found in western alphabets. UTF-8 is compatible
with an older standard called ASCII.

NISCHAL GURUNG 29
Cutting-edge it solution

7. Application Layer
The highest layer of the OSI model, the application layer deals with the techniques that
application programs use to communicate with the network. The name of this layer is a little
confusing. Application programs (such as Microsoft Office or QuickBooks) aren’t a part of
the application layer.

Fig: 7 Layer of OSI Model

When the receiving computer receives the data, the data works its way up through the
protocol stack. Then, the protocol at each layer reverses the processing that was done by the
corresponding layer on the sending computer. Headers are removed data is converted back to
its original format, packets that were split into smaller packets are recombined into larger

NISCHAL GURUNG 30
Cutting-edge it solution

messages and so on. When the packet reaches the application layer protocol, its delivered to
an application that can process the data.

Advantages of OSI Model:


 It is generic model which means that it is supported by wide range of devices.
 The layers are different to each other so, any modification in layer will not cause any
affects.
 It can easily distinguish task in each layer.
 It is flexible and reliable.

Disadvantages of OSI Model:


 It is very complex and difficult for individuals who are newcomers to networking.
 It has limited updates.
 It has not adapted with internet.
 It is expensive.

TCP/IP
As per (Shacklett, Novotny and Gerwig, 2021) TCP/IP is a rule that allows two or more
entities of a communication system used to interconnect network devices on the internet and
it also connects to private network.

Advantages of TCP/IP:
 It connects different computers together.
 It is compatible with any operating system.
 It supports various routing methods.

NISCHAL GURUNG 31
Cutting-edge it solution

Disadvantages of TCP/IP:
 Packets may not always be delivered reliability at the transport layers.
 Replacing the TCP/IP protocol is hard.
 It lacks clear distinction between services, interfaces, and protocols.

IEEE Standard:
IEEE Stands for Institute of Electrical and Electronics Engineers. It plays a vital role in the
field of networking and the main goal got IEEE is to bring up new innovation and vast
technology for the benefit of humanity. In order for all networking devices to interact and
function properly, it needs network service, i.e., the Internet and its related technologies, must
adhere to a set of rules and practices.

There are different types of IEEE standards in computer network. Some of them are listed
below:

NISCHAL GURUNG 32
Cutting-edge it solution

Overview:
As per the requirements of the company I have used TCP/IP as network standards for
network connection because of its simplicity and widespread adaption of network.

Network Topology:
A network topology is the physical and substantial arrangement of a network. This decided,
how do these computers in the network link to each other. For the proper arrangements of
branch as per the condition given in scenario there need to proper selection of network
topology which play vital role for the arrangements of system. It helps in position of nodes
and data transmission between the nodes. It also helps to reduce the operational and
maintenance costs such as cabling costs. A network topology is a factor in determining the
media type to be used to cable a network.

NISCHAL GURUNG 33
Cutting-edge it solution

Slide 9

Logical Topology:
In a computer network, logical topology describes how devices are logically connected and
communicate with one another. Regardless of the physical configuration of the network, it
represents the logical pathways or courses that data takes as it moves between devices.

Physical Topology:
The tangible elements and infrastructure that allow for device connection and communication
within a computer network are referred to as a physical network. It includes all of the tangible
gear, tools, and apparatus used to physically connect network nodes and transfer data
between them.

Different types of network topology are as follows:


1. Mesh Topology
2. Star Topology
3. Bus Topology
4. Ring Topology
5. Hybrid Topology
6. Tree Topology

NISCHAL GURUNG 34
Cutting-edge it solution

1. Mesh Topology
Every device within the network is directly connected to each other device through
individual and dedicated point-to-point links is called Mesh topology. When we say
dedicated, it means that the link only carries data for the two connected devices only. Let’s
say we have devices in the network then each device must be connected with(n-1) devices of
the network. Number of links in a mesh topology of n devices would be n(n-1)/2. ((Alpern
and Shimonski, 2010)

Advantages:
 Mesh topology is reliable and robust network.
 It is secure because there is a point-to-point link thus unauthorized access is not
possible.
 Fault detection is easy.

Disadvantages:
 Huge number of wires are required to connect each system and it is tedious and
headache.
 Each device needs to relate to other devices; number of 1/0 ports required must be
huge.
 Scalability issues because a device cannot relate to large number of devices with a
dedicated point to point link.

2. Star Topology
In star topology each device in the network is connected to central device called hub. Unlike
Mesh topology, star topology doesn’t allow direct communication between devices, a device
must have to communicate through hub. If anyone device which wants to send data to other

NISCHAL GURUNG 35
Cutting-edge it solution

device, it has to first send the data to hub and then the hub transmits that data to the
designated device.

Advantages of Star Topology


 It is less expensive.
 Easier to install.
 Less amount of cables required because each device needs to be connected with hub
only.
 The link can be easily identified.
Disadvantages of Star Topology
 If hub goes down everything goes down.
 Regular maintenance is required.

3. Bus Topology
In bus topology there is main cable, and all the devices are connected to this main cable
through drop lines. There is a device called tap that connects the drop line to the main cable.
Since all the data is transmitted over the main cable, there is a limit of drop lines and the
distance a main cable can have.

NISCHAL GURUNG 36
Cutting-edge it solution

Advantages:
 Easier to install.
 Less cables are required than Mesh and Star topology.

Disadvantages:
 Difficult to find the fault.
 A limit of how many nodes you can connect with backbone cable.

4. Ring Topology:
In ring topology each device is connected with the two devices on either side of it. There are
two dedicated point to point links a device has with the devices on either side of it. This
structure forms a ring thus it is known as ring topology.

NISCHAL GURUNG 37
Cutting-edge it solution

Advantages:
 Easy to install.
 Managing is easier as to add or remove a device from the topology.

Disadvantages:
 A link failure can fail the entire network as the signal will not travel forward due to
failure.
 Data traffic issues, since all the data is circulating in a ring,

Hybrid Topology
A combination of two or more topology is known as hybrid topology. For example, a
combination of star and mesh topology is known as hybrid topology.

NISCHAL GURUNG 38
Cutting-edge it solution

Benefits:
 We can choose the topology based on the requirement.
 Scalable as we can further connect other computer networks with the existing
networks with different topologies.

Cons:
 Fault detection is difficult.
 Installation is difficult.
 Design is complex so maintenance is high thus expensive.

Tree Topology:
Tree Topology is a type of network topology that consists of a tree structure where all the
devices are connected to one another in a hierarchical structure resembling like a tree. Bus
and star topology are combined to form a tree topology.

NISCHAL GURUNG 39
Cutting-edge it solution

Advantages:
 It has the characteristics of both bus and star topology.
 Finding errors is simple.
 Network can be easily enlarged.

Disadvantages:
 Due to size, maintenance and configuration are hard.
 Security is very poor.
 It has high cost.

NISCHAL GURUNG 40
Cutting-edge it solution

Communication and Bandwidth:


Bandwidth is the process of transmitting amount of data over a network connection. It is
measured in Hertz. (Admin, 2018)

Network topology impact on Communication and Bandwidth:


Network topology impact on communication and bandwidth because the topology determines
devices are interconnected between them and it can facilitate efficient communication by
reduction of distance between devices. This topology provides network segmentation, its
resilience the fault and can recover the data without any problems. It can impact on the
network scalability and ability for the future growth of company because the devices can be
easily added without affecting the whole network. While the chosen network topology can
manage and troubleshoot the network as simpler topology can make it easier for managing
the network problems.

Overview:
As I have discussed about all topology with its advantages and disadvantages by comparing
all Here, I have used star topology for Cutting Edge IT solution because it is mostly
commonly used topology for the network, and it can manage the entire network from one
location and flexibility, reliability, cost efficient, performance, security etc. with these
advantages we can perform every task in the Company without having problems. Our
network can be easily monitored and troubleshoot which can be easily established and
improve network performance with minimum network traffic. If any of the computers fail to
operate then the whole star network will not be affected and there is no disruption to the
network connecting or removing parts. So, I would like to use and prefer star topology for the
new branch.

Network Protocol
 HTTP is a layer that is designed for moving a hypertext between two or more
systems.
 DHCP is a protocol for network management and used for automating the process of
configuring devices on IP networks.
 TLS is a protocol which is designed for data security and privacy over the internet.

NISCHAL GURUNG 41
Cutting-edge it solution

Overview
With the use of networking principles i.e., OSI model and TCP/IP model all the protocols in
different layers are used for smooth communication between sender and receiver.

Networking Devices
Networking devices are the hardware devices which are used to connect computers, printers,
fax machines and other electronic devices to a network. These devices transfer data in a fast,
secure, and correct way over same or different networks.

1. Switch
A switch is a networking device operating at layer 2 that connects devices within a local area
network. It interchanges the data packets between devices on the same network.

2. Router
A router is a network layer hardware device that transmits data from one LAN to another if
both networks support the same set of protocols. So, a router is typically connected to at least
two LANs and internet service provider.

3. Hub
A hub is a physical layer networking device which is used to connect multiple devices in a
network. They are generally used to connect computers in a LAN.

4. Firewall
A system which is designed to protect an intranet from unauthorized access is called Firewall.
They are the first line of defense against unauthorized access to private networks. They can
be used effectively against virus, trojan or worm attacks.

NISCHAL GURUNG 42
Cutting-edge it solution

5. Server
A server is a software or hardware device that accepts and responds to requests made over a
network. The device that makes the request and receives a response from the server is called
a client.

6. Workstation (PC)
A workstation is a high-performance computer system specifically designed for individual
use, boasting advanced graphics capabilities, ample storage capacity, and a robust central
processing unit (CPU).

Workstation hardware dependence and the relevant networking software


The interconnection between the physical components of a workstation and the
corresponding network software plays a pivotal role in its overall functionality and
operational efficiency. The hardware elements comprising the workstation, encompassing the
central processing unit (CPU), graphics card, and storage capacity, collectively contribute to
determining the workstation's performance capabilities, encompassing processing power,
graphics prowess, and storage capacity.

Additionally, the networking software integrated into the workstation's setup assumes a
critical role by facilitating seamless connectivity and effective communication not only
among workstations within the network but also with other peripheral devices and external
networks. This networking software plays a vital role in enabling collaborative efforts among
users, resource sharing, and the swift and secure movement of data within the network
environment.

Server Operating System:


A server operating system is a type of operating system that is designed to be installed and
used on a computer. It is an advanced operating system with the features and functionalities
needed in a client-server architecture.

Client Operating System:


Client Operating System is a system that works within computer desktops and other portable
devices such as laptops and smartphones. It can manage different components connected to it
like printers, monitors, and cameras. Windows, Mac and Android are some of the examples
for client operating system.

NISCHAL GURUNG 43
Cutting-edge it solution

Overview:
I have used client operating system for the new branch in Butwal because it works within
computer and other portable devices and support wide range of applications.

Client Computer Configuration

NISCHAL GURUNG 44
Cutting-edge it solution

Server Configuration

NISCHAL GURUNG 45
Cutting-edge it solution

Task 2
Network Design
Network design is the practice of planning and designing a communications network.
Network design includes things like network analysis, IP addressing, hardware selection, and
implementation planning.

Physical Diagram of Network System

Fig: Physical Diagram of network system

NISCHAL GURUNG 46
Cutting-edge it solution

Logical Design of the network:


IP Sheet:

Device Requirements

NISCHAL GURUNG 47
Cutting-edge it solution

Overview
To make cisco network I have used devices which are mentioned in above table with cost.
With this design and those devices makes the performance smooth and secured for our
network system which is created for the new branch in Butwal of Cutting Edge It Solution.

Implement a networked system based on a prepared design structure design.

Fig: Structure design in cisco

1. VTP

NISCHAL GURUNG 48
Cutting-edge it solution

2. VLAN

3. DHCP

NISCHAL GURUNG 49
Cutting-edge it solution

4. HTTP

NISCHAL GURUNG 50
Cutting-edge it solution

5. DNS

NISCHAL GURUNG 51
Cutting-edge it solution

6. EMAIL

NISCHAL GURUNG 52
Cutting-edge it solution

7. FTP

NISCHAL GURUNG 53
Cutting-edge it solution

8. ROUTING

NISCHAL GURUNG 54
Cutting-edge it solution

9. Wireless Connection in Laptop

Implementation of Telnet and Firewalls for security


1. TELNET

NISCHAL GURUNG 55
Cutting-edge it solution

2. Firewall

NISCHAL GURUNG 56
Cutting-edge it solution

Analyze test results against expected results:

Result,

NISCHAL GURUNG 57
Cutting-edge it solution

Result:

NISCHAL GURUNG 58
Cutting-edge it solution

Result,

Result:

NISCHAL GURUNG 59
Cutting-edge it solution

NISCHAL GURUNG 60
Cutting-edge it solution

Results:

NISCHAL GURUNG 61
Cutting-edge it solution

Result,

NISCHAL GURUNG 62
Cutting-edge it solution

To being Configurating Admin and User in Virtual MWare:


1. Start by running the download VMware installation file. This will initiate the
VMware workstation Pro installation process.

NISCHAL GURUNG 63
Cutting-edge it solution

Fig1: VMWare Installation steps

2. For the installation of the server from a .iso file. Here we need to install
Server2012R2 then go to create a new virtual machine and set the minimum
required hard disk to 30 GB and RAM 4GB.

NISCHAL GURUNG 64
Cutting-edge it solution

3. For installing Window 10 as a client, we need to follow the steps below:

NISCHAL GURUNG 65
Cutting-edge it solution

NISCHAL GURUNG 66
Cutting-edge it solution

NISCHAL GURUNG 67
Cutting-edge it solution

NISCHAL GURUNG 68
Cutting-edge it solution

NISCHAL GURUNG 69
Cutting-edge it solution

4.
5. Now we need to add active directory. Firs of all open server manager and click on
‘Local Server’. After that go to ‘Manage’ menu and select ‘Add Roles and Features’.

6. Click next and next and then select active directory from add roles windows.

NISCHAL GURUNG 70
Cutting-edge it solution

7. Select the restart option, if necessary, as option and then press install button.

8. After complete installation of Active Directory, you need to click on ‘promote this
server to Domain Controller’.

NISCHAL GURUNG 71
Cutting-edge it solution

9. Select ‘Add a new forest’ from deployment configuration windows and write domain
name as cuttingedge.com

NISCHAL GURUNG 72
Cutting-edge it solution

10. Enter password and confirm the password.

NISCHAL GURUNG 73
Cutting-edge it solution

11. Click the next and again click on next to check NetBIOS name (Capital letters will
come automatically) then click next

12. So, to check the Path, Review and Prerequisites you need to press next and proceed to
install.

NISCHAL GURUNG 74
Cutting-edge it solution

NISCHAL GURUNG 75
Cutting-edge it solution

13. For changing IP address in client, you need to go to Network and setting which
changes adapter and then select Ethernet and right click. And from there select the
properties where you will find IPV4 and click it and select properties. After that
change the IP to 172.168.10.2, Subnet mask 255.255.255.240, Default Gateway to
172.168.10.1 and Preferred DNS as 172.168.10.10.

14. Check whether the connection is established or not in client side where you can also
check ping from the server IP address.

NISCHAL GURUNG 76
Cutting-edge it solution

15. Ping the domain name ‘Cuttingedge.com’.

16. After pining you need to go to tools for active Directory user and computers and then
select user folder. From there right click and create users. Create username it1, it2,
hr1, sales2 and fin1 for demo. Create group as admin rights and read rights. When
creating user, we need to give password to user which will be using to access the user
from client operating system. Assigning the it1 and it2 as users in admi rights and hr1,
sales1 and fin1 in read rights.

NISCHAL GURUNG 77
Cutting-edge it solution

NISCHAL GURUNG 78
Cutting-edge it solution

NISCHAL GURUNG 79
Cutting-edge it solution

NISCHAL GURUNG 80
Cutting-edge it solution

17. Go to client server and change the domain name from This PC to “Cuttingedge.com”.
Then we get prompt to shut down the client. While logging in, provide the user’s
name and password which we have created. Once logged in, run the command, and
provide \\177.168.10.10. (Server Ip). After that we can open server successfully and
now we can transfer the files and folder there and it shall be updated to server and
other users.

NISCHAL GURUNG 81
Cutting-edge it solution

NISCHAL GURUNG 82
Cutting-edge it solution

18. Now we need to add Web Server (IIS) to access website. Open server manager and
click on local server and move to manage menu and select add role and features.
Select Webserver (IIS) and enter next. Then you can select the features you want to
give and install. Here we need to select FTP.

NISCHAL GURUNG 83
Cutting-edge it solution

19. Go to tools and select IIS Manager from the list, after that Internet Information
Service Manager dialog box will open then go to sites and right click it and add a new
website with all the details.

NISCHAL GURUNG 84
Cutting-edge it solution

20. In client server go to it1 and open web browser and type domain name cutting.com. It
should open the page.

NISCHAL GURUNG 85
Cutting-edge it solution

21. Create a folder named FTP in C drive and right click on it. When right click on folder
go to security and select advance. Then select disable permission and remove the
users group. After that click on and select principle then add group (adminrights and
readrights) for permission. Give full permission to adminrights group and readrights
group to only rights.

NISCHAL GURUNG 86
Cutting-edge it solution

22. Go to IIS manager and right click on site and add an FTP server and provide FTP
server name and provide path of folder which we have created i.e., c:\FTP. Bind FTP
with ip and select no ssl certificate. After that select basic and select specified roles
and group in allow access to add adminrights group name and read with permission.

NISCHAL GURUNG 87
Cutting-edge it solution

23. Go to client machine and open explorer and type ftp://serveripaddress.

NISCHAL GURUNG 88
Cutting-edge it solution

24. Now go to C drive and then create a folder with FTPreadonly and right click in the
file sharing which provide read only to hr1, sales1 and finance and provide read and
write features to it1 and it2.

NISCHAL GURUNG 89
Cutting-edge it solution

NISCHAL GURUNG 90
Cutting-edge it solution

25. Here on client machine, it has already open \\172.168.10.10 in run. Access the server
and folder with the name ftpreadonly then create a folder as ITuserfolder and log out
from the system. Instead of using it1 and it2, use hr1, fin1 or sales to login again.
After that type \\172.168.10.10 and run it. After running try to create another folder
inside ftpreadonly then you will get a message like “Permission Denied”.

NISCHAL GURUNG 91
Cutting-edge it solution

NISCHAL GURUNG 92
Cutting-edge it solution

Maintenance Schedule:

Gantt Chart:

NISCHAL GURUNG 93
Cutting-edge it solution

Testing and evaluating the design to meet the requirements and analyzing user
feedback:

NISCHAL GURUNG 94
Cutting-edge it solution

NISCHAL GURUNG 95
Cutting-edge it solution

Network system Potential Enhancement:


Hardware
Hardware are the component used to run devices smoothly. If the system performs multiple
functions at a single time, there may be chance of system performing ineffective. Since
processor has average graphics and a fast-processing speed, the available CPU can be used to
run any kind of device properly.

Software
Software plays powerful role in forming the group of organization. Including all the MS word
office can also be enhanced as last office consists advanced features suits for the sky
rocketing development environment.

Security
Security is provided to our network components through a VLAN which I used on logical
connection of workstations, servers, and network computers that tend to be on the same Local
Area Network (LAN) regarding their geographical separation. In a summary, hardware on the
same VLANs allows traffic between equipment to be independent and more reliable. For the
consideration for the development of future purpose there will be many operating system,
hardware devices and more VLAN protection.

Server:
A server is a software or hardware entity responsible for receiving and processing requests
from devices connected to a network. The devices that initiate these requests and receive
responses from the server are referred to as clients. Typically, the term "server" specifically
pertains to the computer system that accepts requests for web files and transmits the
requested files back to the clients. There are manly two types of servers i.e.

1. Physical Server
2. Logical Server

Physical Server:
A physical Server is also referred to as a ‘bare-metal-server’ which means that a specific
physical server is designated to a single user. The server is large in size due to huge and
powerful processing components. Different types of servers are:

 Tower Server

NISCHAL GURUNG 96
Cutting-edge it solution

Tower servers seem dated and look more like desktops than servers, tower servers are
probably found more often in smaller environments than anywhere else because it can take up
a lot of space and are tough to physically manage since you can't easily stack them on one
another.

 Rack Server
Rack servers are extremely common and these racks along with other critical data center
equipment such as backup batteries, switches, and storage arrays.

 Blade Server:
A blade server is a compact and energy-efficient server computer designed with a modular
structure to optimize space utilization.

Logical Server:
Logical server is also referring to as virtual server that runs on virtualized software which
shares the resources of physical server. Some of logical server used in logical server are as
follow:

File Server:
The file server is a networking device that plans to store, manage, and share files and data
within the range of a network. It provides a concentrate storage location for storing data and
files from one computer or any other devices which are connected to the network.

Print Server:
Print server allows shared access printers and mostly use LAN operating systems to provide
printing service to all the pcs in the company. Its main objective is to centralize print
resources and open up access to printers for a variety of network users or devices.

Network Server:
A network server is a special computer connected to internet users across the world for
sharing of information. The server is built with high quality component and is stored in data
center, to ensure better internet connectivity.

Application Server:
Application Server is a type of server designed to install, operate, and host applications. In
the early days of application servers, there was a huge growth in the number of applications
brought to the Internet.

NISCHAL GURUNG 97
Cutting-edge it solution

Database Server:
A database server is a server which uses a database application that provides database
services to other computer programs or to computers, as defined by the client–server model,
the database engine does all the selecting, sorting, and updating.

Email Server:
An email server is a application which is used for sending, receiving, and storing messages. It
helps to function email communication by managing the flow of email traffic between sender
and client by ensuring that the message is delivered to the intended receiver.

NISCHAL GURUNG 98
Cutting-edge it solution

Overview:
So, here I have selected blade server for new branch in Butwal because it can provide all the
needed connection for the company. A blade server generally has much less cable than tower
or rack server since a lot of the connectivity is handled internally. heat. From a cost
perspective, blade servers require some initial infrastructure, such as the chassis, so the
upfront cost is often higher than for servers of other types, but it can be maintained and
monitored easily through a single interface which makes the business run smoothly and it is
also used in Cutting Edge IT Solution branch located at Butwal.

Evaluating critical reflection and justifying valid conclusions


For Cutting Edge IT Solution, I have used peer-to-peer and cloud-based networking solutions
due to their cost-effectiveness and straightforward installation process. Files share has also
been easy while cloud computing also helps to backup of the files that we have shared in the
branches which makes easy to solve the problems and the performance level is also higher.
As per the designer of Cutting-Edge IT solution, some of the feedbacks are provided after
analyzing its positive as well as negative aspects. As per the designed, first I have used lower
range of security after receiving the feedback. I have changed into higher level of security. I
have used higher level of security of using NAT and port Security. Nat is used to hide the IP
address and single IP applicable for the entire Pc. First devices of lower range are used on the
company. After receiving the feedback, I have changed into higher range for the best
performance of the devices. This may create some interruptions after some durations that’s
why I have used tower server as this server is suitable for Cutting Edge IT solution. Tower
server supports most basic applicators such as system management, file management, print
collaboration, and distribution and system security. In the organization there are many files to
be managed in a secure way, so tower server is best for the IT scenario. There are 5
topologies in which, I actually have selected hybrid topology, which is formed through the
mixture of star topology and bus topology. It can be utilized as network structure for the
efficient usage of this system. As I actually have already point out approximately the
workflow of hybrid topology, the significance of this topology is that most effective the
damaged workstation is disconnected, while the rest of the network maintains to perform
normally. They are not able to communicate with the affected workstation as it has been

NISCHAL GURUNG 99
Cutting-edge it solution

isolated. It is simple to access, understand, and installation at a low cost, and it gives a brief
operation to repair the trouble and growth the capacity to deal with complex routing protocol.
For the effectiveness of complete network system, I actually have completed checking out of
DHCP, DNS, Email, Telnet, Routing, and VPN. I have tested all the necessary steps to make
it better and reliable. First, I have configured in lower level later on I have changed into
higher level to make performance of the device better.

References:

Spiceworks. (2023). What Is a Computer Network? Definition, Objectives, Components,


Types, and Best Practices - Spiceworks. [online] Available at:
https://www.spiceworks.com/tech/networking/articles/what-is-a-computer-network/
[Accessed 17 Jul. 2023].

GeeksforGeeks. (2020). What is P2P Peer to Peer Process. [online] Available at:
https://www.geeksforgeeks.org/what-is-p2ppeer-to-peer-process/ [Accessed 17 Jul. 2023].

Computer Science GCSE GURU. (2019). Client-Server Networks - Computer Science GCSE
GURU. [online] Available at: https://www.computerscience.gcse.guru/theory/client-server-
networks [Accessed 17 Jul. 2023].

VMware. (2023). What is Cloud Architecture? | VMware Glossary. [online] Available at:
https://www.vmware.com/topics/glossary/content/cloud-architecture.html [Accessed 17 Jul.
2023].

‌Arley, A. (2021). Network standards and devices - Alan Arley - Medium. [online] Medium.
Available at: https://medium.com/@alan6arley/network-standards-and-devices-
1bf99da95b05 [Accessed 21 Jul. 2023].

‌ hacklett, M.E., Novotny, A. and Gerwig, K. (2021). TCP/IP. [online] Networking.


S
Available at: https://www.techtarget.com/searchnetworking/definition/TCP-IP [Accessed 21
Jul. 2023].

Alpern, N.J. and Shimonski, R.J. (2010). Network Fundamentals. [online] pp.1–18. doi:
https://doi.org/10.1016/b978-1-59749-428-1.00003-5.

Admin (2018). Bandwidth of a Signal and Measurement of Bandwidth - Physics | BYJU’S.


[online] BYJUS. Available at: https://byjus.com/physics/what-is-bandwidth-of-a-signal-how-
is-bandwidth-measured/ [Accessed 18 Jul. 2023].

NISCHAL GURUNG 100

You might also like