100% found this document useful (6 votes)
1K views125 pages

Networking Assignment

The document discusses various aspects of networking, including different types of networks, topologies, devices, and servers. It focuses on setting up and testing several core network services, providing prerequisites, configuration steps, and testing procedures for domain controllers, DNS, IIS, DHCP, print servers, VPNs, RODCs, CDCs, and WDS. The goal is to design and evaluate a network, receiving feedback from users on the implemented services.

Uploaded by

Athl S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (6 votes)
1K views125 pages

Networking Assignment

The document discusses various aspects of networking, including different types of networks, topologies, devices, and servers. It focuses on setting up and testing several core network services, providing prerequisites, configuration steps, and testing procedures for domain controllers, DNS, IIS, DHCP, print servers, VPNs, RODCs, CDCs, and WDS. The goal is to design and evaluate a network, receiving feedback from users on the implemented services.

Uploaded by

Athl S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 125

Networking 2019

Contents
Part 1 ...................................................................................................................................................... 4

Introduction: ..................................................................................................................................... 4

Network types and standard: .......................................................................................................... 4

Network Topology: ...................................................................................................................... 11

Networking Devices: ................................................................................................................... 16

Server Types: ............................................................................................................................... 18

Interdependence of workstation hardware ................................................................................... 19

Conclusion: ..................................................................................................................................... 20

Part 2 .................................................................................................................................................... 21

Introduction: ................................................................................................................................... 21

Explanation of server that I used: ................................................................................................ 21

Explanation of network devices: .................................................................................................. 22

Explanation of network component: ............................................................................................ 23

Testing of design : ........................................................................................................................ 23

Evaluation of design: ................................................................................................................... 24

Feedback from Users: .................................................................................................................. 25

Lab Report: .................................................................................................................................. 26

A. Domain Controller (DC): ............................................................................................................. 26

1. Introduction: .............................................................................................................................. 26

2. Prerequisites for Domain Controller (DC):............................................................................... 26

3. Steps For DC: ............................................................................................................................ 26

4. Testing: ..................................................................................................................................... 34

B. Domain Name System (DNS):..................................................................................................... 35

1. Introduction: .............................................................................................................................. 35

2. Prerequisites of DNS: ............................................................................................................... 35

1
Dinisha Nath (HND / First Semester)
Networking 2019

3. Step for DNS ............................................................................................................................. 35

5. Testing....................................................................................................................................... 43

C. IIS Server ..................................................................................................................................... 44

1. Introduction: .............................................................................................................................. 44

2. Prerequisites for IIS Server ....................................................................................................... 44

3. Steps for IIS Server ................................................................................................................... 45

I. Testing....................................................................................................................................... 50

D. DHCP Server ............................................................................................................................... 50

I. Introduction::............................................................................................................................. 50

II. Prerequisites for DHCP Server: ............................................................................................ 50

III. Steps for DHCP: .................................................................................................................... 51

DHCP relay agent: ....................................................................................................................... 59

IV. Testing ................................................................................................................................... 73

E. Print Server .................................................................................................................................. 76

I. Introduction: .............................................................................................................................. 76

II. Prerequisites for Print Server ................................................................................................ 76

III. Steps for Print Server ............................................................................................................ 76

IV. Testing ................................................................................................................................... 81

F. VPN Server .................................................................................................................................. 82

I. Introduction ............................................................................................................................... 82

II. Prerequisites for VPN Server ................................................................................................ 82

III. Steps for VPN Server ............................................................................................................ 82

IV. Testing ................................................................................................................................... 96

G. RODC .......................................................................................................................................... 96

I. Introduction: .............................................................................................................................. 96

II. Prerequisites for RODC ........................................................................................................ 96

III. Steps for RODC .................................................................................................................... 97

2
Dinisha Nath (HND / First Semester)
Networking 2019

H. Testing ................................................................................................................................. 105

H. CDC ........................................................................................................................................... 106

I. Introduction ............................................................................................................................. 106

II. Prerequisites for CDC ......................................................................................................... 107

III. Steps for CDC ..................................................................................................................... 107

IV. Testing ................................................................................................................................. 111

I. WDS........................................................................................................................................... 112

I. Introduction ............................................................................................................................. 112

II. Prerequisites for WDS ......................................................................................................... 112

III. Steps for WDS..................................................................................................................... 112

IV. Testing ................................................................................................................................. 121

Analyzing the result: .......................................................................................................................... 121

Network Connectivity Testing .................................................................................................... 121

Testing of the domain: ....................................................................................................................... 122

Print server: ........................................................................................................................................ 123

VPN test: ............................................................................................................................................ 124

Conclusion: ................................................................................................................................... 125

3
Dinisha Nath (HND / First Semester)
Networking 2019

Part 1
LO1 Examine networking principles and their protocols.

LO2 Explain networking devices and operations.

You will need to produce a report for the CEO that includes the following:

1. An introduction to provide an overview of your report.

2. An explanation of networking principles, protocols and devices, including benefits and constraints
of networked solutions, the impact of network topology, communication and bandwidth requirements,
effectiveness of networking systems, operating principles of networking devices and server types and
networking software.

Introduction:
Networking is the way of communicating between various device with using various medium. It is a
group of two or more computers connected with each other for sharing resources and information. A
simple computer network can be built only from two computers while a complex computer network
can be built from several thousand computers.

Network types and standard:


Computer network can be categorized based on geographical basis and functionalities basis.

 On the basis of functionalities basis:


i. Peer-to-peer network:
It s the network which is used in local connection. Here, one server will manage the
connection with all the workstations by storing data & information and also accessing
of it. This is kind of centralized database which is used in small area or local area
network.
 Advantages of peer-to-peer network:

 The main advantage of peer to peer network is that it is easier to set up

 The peer to peer network is less expensive.

 In peer-to-peer networks all nodes are act as server as well as client


therefore no need of dedicated server.

4
Dinisha Nath (HND / First Semester)
Networking 2019

 It is easier to set up and use this means that you can spend less time in
the configuration and implementation of peer to peer network.

 It is not require for the peer to peer network to use the dedicated server
computer. Any computer on the network can function as both a network
server and a user workstation.

 Disadvantages of peer-to-peer network:

 A computer can be accessed anytime.

 Network security has to be applied to each computer separately.

 Backup has to be performed on each computer separately.

 No centralized server is available to manage and control the access of


data.

 Users have to use separate passwords on each computer in the network.

ii. Client server network:

It is wide area networking where number of server will manage networking with other
workstation. It is kind of distributed database which is used for long range connection.
Client computers provide an interface to allow a computer user to request services of
server and display the results the server returns. Server wait for requests to arrive from
clients and then respond to them.

 Advantages of client server:

 Unlike P2P, where there is no central administration, here in this


architecture there is a centralized control. Servers help in administering
the whole set-up.

 All the files are stored at the same place. In this way, management of
files becomes easy. Also it becomes easier to find files.

5
Dinisha Nath (HND / First Semester)
Networking 2019

 As new information is uploaded in database , each workstation need not


have its own storage capacities increased. All the changes are made only
in central computer on which server database exists.

 Changes can be made easily by just upgrading the server. Also new
resources and systems can be added by making necessary changes in
server.

 Disadvantages of client server:

 Too many requests from the clients may lead to congestion, which rarely
takes place in P2P network. Overload can lead to breaking-down of
servers.

 Too many requests from the clients may lead to congestion, which rarely
takes place in P2P network. Overload can lead to breaking-down of
servers.

 It is very expensive to install and manage this type of computing.

 You need professional IT people to maintain the servers and other


technical details of network.

 On the basis of geographical basis:

i. Local Area Network (LAN):

A local area network (LAN) is a computer network that interconnects computers within
a limited geographical area such as a home, school, computer laboratory, or office
building using network media. The main aim of LAN is to share computer hardware,
software and data. In LAN workstations are connected to a server.

 Advantages of LAN:

 Workstations can share peripheral devices like printers. This is chapter


than buying a printer for every workstation.

6
Dinisha Nath (HND / First Semester)
Networking 2019

 Workstations do not necessarily need their own hard disk or CD-ROM


drives which make them cheaper.

 User can communicate with each other and transfer data workstations
very easily.

 User can save their work centrally on the network’s file server. This
means that they can retrieve their work from any workstation.

 Disadvantages of LAN:

 Limited to small geographical area only.

 Special security measures are needed to stop users from using programs
and data that they should not have access to.

 Networks are difficult to set up and need to be maintained by skilled


technician.

 If the file server develops a serious fault, all the users are affected.

ii. Metropolitan Area Network (MAN):

Metropolitan Area Network (MAN) is computer network usually spanning a campus or


a city, which typically connect a few local area networks using high speed backbone
technologies, A MAN often provides efficient connections to wide area network
(WAN).

 Advantages of MAN:

 It covers larger geographical area than LAN.

 Handles more computers than LAN.

 In MAN, dissimilar systems and networks can ne connected.

 Disadvantages of MAN:

7
Dinisha Nath (HND / First Semester)
Networking 2019

 Compared to LAN, MAN requires more hardware for connection.


Hence, it is expensive compared to LAN.

 Data transfer rate in MAN is lesser than in LAN.

 Compared to LAN it is more complex to manage the network.

iii. World Area Network (WAN):

A Wide Area Network (WAN) is a computer network covering large geographical


areas, which may spread across the entire world. WANs often connect multiple smaller
networks, such as LANs or MANs. WAN uses satellite, microwave or optical fibers to
make the communication possible among the different computers connected in the
network. The world’s popular WAN is Internet.

 Advantages of WAN:

 Covers a large geographical area, so long distance businesses can


connect on the network.

 Shares software and resources with connecting workstations.

 Messages can be sent quickly to anyone else on the network. These


messages can have pictures, sounds, or data included with them.

 Expensive things (such as printers or phone lines to the internet) can be


shared by all the computers on the network without having to buy a
different peripheral for each computer.

 Everyone on the network can use the same data. This avoids problems
where some users may have older information than others.

 Disadvantages of WAN:

 It’s expensive and generally slow.

 It needs a good firewall to restrict outsiders from entering and disrupting


the network.

8
Dinisha Nath (HND / First Semester)
Networking 2019

 Setting up a network can be an expensive and complicated experience.


The bigger the network, the more expensive it is.

 Security is a real issue when many different people have ability to use
information from other computers. Protection against hackers and
viruses adds more complexity and expenses.

 Once set up, maintaining a network is a full-time job which requires


network supervisors and technicians to be employed.

The various types of network standard are:

i. OSI model:

The Open Systems Interconnection (OSI) Model is a conceptual and logical layout that
defines network communication used by systems open to interconnection and
communication with other systems. The model is broken into seven subcomponents, or
layers, each of which represents a conceptual collection of services provided to the
layers above and below it. The OSI Model also defines a logical network and effectively
describes computer packet transfer by using different layer protocols.
The seven layer of OSI model are:
1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer

 Advantages of OSI model:

 It is a generic model and acts as a guidance tool to develop any network


model.

 It is a layered model. Changes are one layer do not affect other layers,
provided that the interfaces between the layers do not change drastically.

9
Dinisha Nath (HND / First Semester)
Networking 2019

 It distinctly separates services, interfaces, and protocols. Hence, it is flexible


in nature. Protocols in each layer can be replaced very conveniently
depending upon the nature of the network.

 It supports both connection-oriented services and connectionless services.

 Disadvantages of OSI model:

 It is purely a theoretical model that does not consider the availability of


appropriate technology. This restricts its practical implementation.

 The launching timing of this model was inappropriate. When OSI appeared,
the TCP/IP protocols were already implemented. So, the companies were
initially reluctant to use it.

 The OSI model is very complex. The initial implementation was


cumbersome, slow and costly.

 Though there are many layers, some of the layers like the session layer and
presentation layer have very little functionality when practically deployed.

ii. TCP/IP model:


Like the OSI model, the TCP/IP model is layered and is used in the same fashion as the
OSI model but with fewer layers. As the modern Internet and most communications use
the Internet Protocol (IP), the TCP/IP model is technically more in line with modern
network implementations. TCP/IP is the language a computer uses to access the
internet. It consists of a suite of protocols designed to establish a network of networks
to provide a host with access to the internet. TCP/IP contains four layers, which differ
slightly from the OSI model.
The four layers of TCP/IP model are:
1. Link layer
2. Internet layer
3. Transport layer
4. Application layer

10
Dinisha Nath (HND / First Semester)
Networking 2019

 Advantages of TCP/IP model:


 It is an industry–standard model that can be effectively deployed in
practical networking problems.
 It is interoperable, i.e., it allows cross-platform communications
among heterogeneous networks.
 It is an open protocol suite. It is not owned by any particular institute
and so can be used by any individual or organization.
 It is a scalable, client-server architecture. This allows networks to be
added without disrupting the current services.
 It assigns an IP address to each computer on the network, thus making
each device to be identifiable over the network. It assigns each site a
domain name. It provides name and address resolution services.
 Disadvantages of TCP/IP model:
 It is not generic in nature. So, it fails to represent any protocol
stack other than the TCP/IP suite.
 It does not clearly separate the concepts of services, interfaces,
and protocols. So, it is not suitable to describe new technologies in
new networks.
 It does not distinguish between the data link and the physical
layers, which has very different functionalities. The data link layer
should concern with the transmission of frames.
 It was originally designed and implemented for wide area
networks. It is not optimized for small networks like LAN (local
area network) and PAN (personal area network).

Network Topology:
In computer network, topology is the way in which various components of a network (like nodes, links,
peripherals, etc.) are arranged. The way in which different systems and nodes are connected and
communicate with each other is determined by topology of network. Topology is the physical layout
of nodes work stations and cables in the local area network.

11
Dinisha Nath (HND / First Semester)
Networking 2019

The different network topologies are:

1. Bus topology:
A bus topology is the simplest of network topologies. In this type of topology, all the nodes are
connected to the single coaxial cable, by the help of interface connectors. This central cable is
the backbone of the network and is known as Bus. Every workstation communicates with the
order device through this Bus. A signal from the sources is broadcast and it travels to all
workstation connected to the bus cable.

Its functions only transmit data in only one direction stream, and each device is connected to one cable.
It is easy to set-up and extend bus network. Cable length required for this topology is the latest
compared to other topology. Dependency on the central cable in this topology has its disadvantages.
If the main cable encounters some problem, the whole network breaks down. If network traffic is
heavier, it is more likely to fall on network performance.

2. Ring Topology:
A ring topology is a network configuration in which device connections create a
circular data path. Each networked device is connected to two others, like points on a circle. In
ring topology, all the nodes are connected to each-other in such a that they make a closed loop.
Each workstation is connected to two other components on either side, and it communicates
with these two adjacent neighbors. Data travels around the network, in one direction. Sending
and receiving of data takes place with the help of token. Token contains a piece of information
which along with data is sent by the source computer.

12
Dinisha Nath (HND / First Semester)
Networking 2019

Impacts of ring topology are:


Its feature is to prevent data loss through repeaters, as if someone had to send some data to the last
node in a ring topology with 100 nodes, then it had to go through all 99 nodes to reach the 100th node.
Even when the load on the network increases, its performance is better than that of Bus topology. If
one workstation or port goes down, the entire network gets affected. Network is highly dependent on
the wire which contains different component. There is no need of network server to control the
connectivity between workstation.

3. Star Topology:
Star topology is a network topology where each individual piece of a network is attached to a
central node (often called a hub or switch). The attachment of these network pieces to the
central component is visually represented in a form similar to a star. Unlike bus topology,
where nodes are connected to central cable, here all the workstations are connected to central
devices with the point-to-point connection. So it can be said that every computer is indirectly
connected to every other node with the help of “hub”.

13
Dinisha Nath (HND / First Semester)
Networking 2019

Impacts of star topology are:


In star topology new nodes can be added easily without affecting rest of the network. Similarly
components can be also be removed easily. The use of hub, a router, a switch as central device increases
the overall cost of network. As compared to Bus topology it gives far better performance. This signals
don’t necessarily get transmitted to all the workstations. A sent signal reaches the intended destination
after passing through no more than 3-4 devices and 2-3 links. Performance of the networking is
dependent on the capacity of central hub. Performance as well as number of nodes which can be added
in such topology is depend on the capacity of hub. This depends on the capacity of the hub to improve
performance.

4. Mesh Topology:
In a mesh topology, each of the network node, computer and other devices are interconnected
with one another. Every node not only sends its own signals but also relays data from other
nodes. In fact a true mesh topology is one where every nodes is connected to every other nodes
in the network. This type of topology is very expensive as there are many redundant
connections. Thus it is not mostly used in computer networks.

Impacts of mesh topology are:

Its functions are completely connected, powerful. It is not flexible. It carries its own data load. The
error is easily recognized. Installation and configuration are complex, but provide confidentiality and
security. The cost of cables is more. Assembly is required. Data can be transmitted from different
devices simultaneously. This topology can withstand high traffic. Set-up maintenance of this topology
is vry difficult. Even administrator of network is tough.

14
Dinisha Nath (HND / First Semester)
Networking 2019

5. Tree Topology:
A topology that has a root node and all other nodes that are connected to it, builds a hierarchy,
is called the topology of the tree. It is also known as a hierarchical topology. It contains three
levels of the hierarchy. This is a connection of topologies, such as a linear bus and a star,
including systems with a topology of stars connected to the main line bus cable. This topology
is also known as the extended star topology.

Impact of tree topology are:

This method are widely used in the global network and are complete if workstations are in groups or
not. It uses the expansion of buses and star topologies. This also helps in the growth of nodes, is a
possible and simple way. It is easy to handle and manage. Error detection can be found easily. It is
expensive and hard to connect to the cable. Maintenance is difficult if the nodes are added as if the
central hub falls, the network drops.

6. Hybrid Topology:
Hybrid topology is an interconnection of two or more basic network topologies, each of which
contains its own nodes. The resulting interconnection allows the nodes in a given basic
topology to communicate with other nodes in the same basic topology as well as those in other
basic topologies within the hybrid topology. When different topologies are related to each
other, they do not reflect the characteristics of any particular topology. “For example, if one
department of the ring topology is worn out, and in another category the stellar topology is
worn in the office, a combination of these two departments will lead to a hybrid topology (ring
topology and stellar topology). This is a scheme that combines a set of topologies into a large
topology.

15
Dinisha Nath (HND / First Semester)
Networking 2019

Impacts of hybrid topology are:

Its peculiarity consists in the fact that it consists of two topologies. Get both the advantages and
disadvantages of topologies that are included. It is defined as the detection of errors and is easily
removed and effective. Adaptable as a size can be easily increased. It is regulated. The design is
complex and expensive to connect.

Networking Devices:
A computer network is a collection of collective network devices that are well organized to share data.
Network devices are devices necessary for network management, network binding, packet routing.
Communicate with others, share files on the network and much more. The different networking devices
are:
i. Server:
This is a computer program that serves the program for another computer program and
its user. It provides data systems on a local area network (LAN) or a wide area network
(WAN) filled with the Internet. For example: a web server, a mail server, a file server,
etc. A simple server property is to visit the port for incoming network requests and a
good presentation.
ii. Hub:
A hub refers to a hardware device that enables multiple devices to be connected to a
computer. It is the most basic networking device that connects multiple network devices
together. Unlike a network switch or router, a network hub has no routing tables or
intelligence on where to send information and broadcasts all network data across each
connection. Most hubs can detect basic network errors such as collisions, but having all
information broadcasts to multiple ports can be a security risk and cause bottlenecks.

16
Dinisha Nath (HND / First Semester)
Networking 2019

iii. Switch:
A network switch is a small hardware device that joins multiple computers together
within one local area network(LAN). Network switches appear nearly identical to
network hubs, but a switch generally contains more intelligence than a hub. Unlike
hubs, network switches are capable of inspecting data packets as they received. By
delivering messages only to the connected device intended, a network switch conserves
network bandwidth and offers generally better performance then a hub.
iv. Router:
A router is a tiny electronic device that connects collective computer networks to each
other through wired or wireless connections that examine the contents of data packets
being transmitted on the network or in other networks. It works by downloading the
configuration file, and then configures the network interface. It adds network addresses
for each to its routing table.
v. Repeaters:
This is an electronic network device that relays the received signal with a higher
bandwidth and a prolonged network barrier than what can be with the original signal.
It is connected to the network line of the device used in two network nodes between
two-way operations for the transmission of physical signals. For the same two types of
network connection, the main goal is to extend the network transmission distance from
the data signal for sending or forwarding.
vi. Bridge:
A bridge is a hardware device for linking two networks that work with the same
protocols. Unlike a repeaters, which works at the physical level, bridge works at logical
level, which means that it can filter frames so that it only lets past data whose
destination address corresponds to a machine located on the other side of the bridge.
vii. Modem:
It is a device or program that provides a computer for transferring data and files over a
telephone or cable line. The term "modem" is combined with modulation and
demodulation, since it performs and modulates and demodulates analog carrier signals
to encode and decode digital information for conversion. It helps to send and receive
digital information between personal computers.

17
Dinisha Nath (HND / First Semester)
Networking 2019

Server Types:
A computer program that provides various services to other computer programs (and its users) is a
server. Whenever computers share resources with client machines, they are considered servers,
because they are unlikely to perform any other tasks than their server tasks. He is responsible for
managing network resources. Dedicated server has high-performance memory, faster processor.

Different types of servers and their operating principles are:

i. Web Server:
A program that needs a hypertext transfer protocol (HTTP) to provide content or
services to end users via the Internet is called a web server. Basically, a web server
consisting of a physical server, a server operating system (OS) and software, must
provide an HTTP connection. It is also known as an Internet server. The web server is
responsible for hosting the website files.
ii. File Server
A file server is a server that facilitates the approach to files that act as a central file store so
that other computers can access files on the same network. It provides the user with the
ability to transfer information over the network without physically transferring files to
another external storage device. Typically, an FTP server (File Transfer Protocol) is used
when transferring files.
iii. Database Server:
The database server refers to the software and hardware used to start the database. It is
identical to the data store where the website stores or stores its data and information. In
the database, the network client sends SOL requests (a structured query) to the database
server, after which the result query is returned over the network.
iv. Virtualization:
v. This refers to creating a virtual resource, such as a server, desktop, operating system,
file, storage, or network. This is a storage device or network resources. Its feature is the
controlled workload by transferring traditional calculations to make it more scalable.
Since it does not require the installation of hardware components, it is a cheaper system
for implementation. This reduces the load. This allows you to quickly deploy resources.
It offers the best uptime.

18
Dinisha Nath (HND / First Semester)
Networking 2019

vi. Print Server:


It is a software application, a networked computer that can create print-related tasks on
a network of computers. They are worn in both large corporate and small office
networks. They are interconnected with a computer network to meet the need for
printing jobs that contain more than one printer on the network.

Interdependence of workstation hardware


The computer system consists of two main elements: hardware and software. In order for any computer
system to function smoothly, a vital role is played by both hardware and software components. If the
necessary hardware and software are not available, the system does not work correctly. Typically,
hardware is a collection of physical elements that you can touch, which are also known as computer
hardware. Similarly, the software is a program consisting of a set of instructions for the computer to
perform certain operations. They are in many ways interdependent with each other.
Without software, computer equipment is useless. Similarly, computer software cannot be used
without hardware support. Therefore, hardware and software components must interact with each other
to make the system on the network..
Hardware required in a workstation:

19
Dinisha Nath (HND / First Semester)
Networking 2019

Software requirement in workstation:


The need for software is required to run any devices. Because the hardware executes software
commands, it is impossible to perform hardware in the absence of software. Terms that can be used to
describe software are scripts, programs, a set of instructions and applications. There are many network
programs that have their own function and specialty. The use of various types of software that is carried
for the network between any two systems is client software, server software, etc.

Server software is usually designed to connect to the server hardware, as well as to the processor,
memory, memory and other communication ports. Different types of servers are a web server, an
application server, a file server, etc. However, the server software also needed to install some operating
system for the proper functioning of the functions. The OS that was created to install and warn the
server is called a server operating system. The firewall is installed on separate servers to manage
incoming and outgoing signals.

Interdependency of workstation:

Hardware and software, they are both very interdependent with each other. To output the computer,
they must work together. Without hardware support, the software can not be used, and if there is no
correct indication of the hardware provided, it is useless. To perform the work, a suitable software
package must be installed in the hardware. As various software, various tasks can be performed in the
hardware. Hardware and software are like the body and soul of a computer system. The software acts
as a connection between the user and, consequently, the hardware.

Conclusion:
Thus, I discussed various types of systems, such as peer-to-peer, client-server etc., as well as network
standards such as OSI model, TCP / IP model, etc., and their advantages and limitations. Also, I have
explained the different effects of network topologies, including the data rate and the connection
between them. I discussed the principles of operation of the mentioned network devices and server
types. And also, I discussed the hardware requirements, the servers with the appropriate software, their
interdependence and how they perform their work.

20
Dinisha Nath (HND / First Semester)
Networking 2019

Part 2
LO3 Design efficient networked systems.

LO4 Implement and diagnose networked systems.

This part of the assignment will contain the following based on the tasks in section 1 and section 2.

A LAN design plan and blueprint and justification document. A fully completed test plan
including an evaluation of results and recommendations for improvements to LAN. A proposed and
justified maintenance schedule. Evidence of an implemented network.

Introduction:
, I'm going to talk about the network system that is prepared by the Visio tool. A server is a type of
network that has organized network resources for other computer programs (and its users). Separation
of functions into two or several different parts of the application is known as server technology.

The figure of networking system Visio Tools is given below:

Explanation of server that I used:


DC:

This means the domain controller. This is the server that leads to the desire for a security conformation
in the Windows server domain. It supports the approach to a set of network resources for a group of
users. In order for a domain to access sources, the user only needs to log on to the system.

21
Dinisha Nath (HND / First Semester)
Networking 2019

DHCP:
DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically
assign an Internet Protocol (IP) address to any device, or node, on a network so they can communicate
using IP. DHCP automates and centrally manages these configurations rather than requiring network
administrators to manually assign IP addresses to all network devices. DHCP can be implemented on
small local networks as well as large enterprise networks. (Rouse, n.d.)

CDC:
It is intended for the controller of the child domain. A child domain is another domain that falls under
the parent domain in the active directory domain in the hierarchy. This is similar to the first root of a
tree used for the boundaries of securities, with low network traffic and an administrative overhead.
RODC:
A read-only domain controller (RODC) is a server that hosts an Active Directory database's read-only
partitions and responds to security authentication requests. It is mainly used for backup of domain,
domain monitoring. Here system administrator can read only data but cannot change its security
policies.

Explanation of network devices:


Router:
A router is a device for connecting two or more different computer networks to one another. It is used
for handling the routing of packets between two networks, or to determine the path that a data packet
shall take.
Switch:
A device that routes incoming data packets from different ports and forwards them to the desired
location on a local area network (LAN) is called a switch. A switch in the local Ethernet network
addressed from the physical device determines in each frame of the incoming message an output port
for forwarding it to and from. The switches are smarter, but they are similar to concentrators.
Printer:
The printer is an output device that receives and displays images from computers and transfers this
input to paper or prints paper documents. Electronic data is sent from computers to printers to print a
document.
Access point:
An access point is a station on a local area network (LAN) that provides wireless devices and wired
networks for linking transmitted and received data. It provides communication between the WLAN
and the supported wired network and connects users to other users on the network.

22
Dinisha Nath (HND / First Semester)
Networking 2019

Firewall:
A network security system designed to secure a private network is called a firewall. It can be performed
as hardware and software, and a combination of both.

Explanation of network component:


Users: An authority that has control over the use of the application and its objects.
Groups: Collections of users with equal permissions.

Organizational unit: A container for storing users, groups and computers is called an organizational
unit.

Membership: membership granted to other clients by the domain controller.

Group policy: It implements configurations for users and computers.

Testing of design :
The process of finding, analyzing and investigating any service, to complete, to find out whether it
works properly or not, is called testing. This helps to find out what error it is. Here we are going to
prepare a test log of what we tested, and what the expected result of this test magazine is.
Test log is given below:

S.N What was Expected Output Actual Output Remarks


tested
1. DHCP The DHCP server must Since the DHCP scope Customer requirements
server be able to automatically is between 2 and 50, the for the corresponding
assign IP addresses to 40 DHCP server can IP address were
client computers. provide up to 44 IP required.
addresses.

2. Domain Computers must be able Customers received the Requirements have


Controller to connect to membership membership view of the been fully satisfied,
(DC) in the same network. primary server. because customers get
a membership.

3. Print server Custom computers must Customers have access The requirements have
be able to share a printer. to a shared printer. been fully met, as
clients gain access to
the printer

23
Dinisha Nath (HND / First Semester)
Networking 2019

4. Web server On the client computer, Web pages were seen on The requirements were
the web page on the the main server. fully met, as the web
primary server should be page was seen on the
displayed using the server.
primary site.

5. VPN server The client computer can The client computer was The requirements were
assign a VPN connection. able to assign VPN fully met.
connections

Evaluation of design:
Evaluation of design is also another important part to consider why it is suitable. Therefore, some of
the reasons are mentioned below that the network I built is suitable for organizations.

Reliability:
Reliability refers to the type of application, delivering packets from the source to the desired source.
Not only the level of communication, but also the components of network communication devices,
such as a firewall, routers, a switch, etc., must also be reliable. It is the function of any computer
component, such as hardware or network, or software that regularly executes in accordance with
requirements. Since I created a network for Nepal Bangladesh Bank Limited, taking into account all
the requirements of the organization.
Bandwidth:
Bandwidth is defined as a range within a band of frequencies or wavelengths. Bandwidth is also the
amount of data that can be transmitted in a fixed amount of time.For digital devices, the bandwidth is
usually expressed in bits per second(bps) or bytes per second. For analog devices, the bandwidth is
expressed in cycles per second, or Hertz (Hz).The bandwidth is particularly important for I/O devices.
In my network design, I used sufficient bandwidth to simultaneously transmit and receive more data.

Scalability:
Scalability is an attribute that describes the ability of a process, network, software or organization to
grow and manage increased demand. A system, business or software that is described as scalable has
an advantage because it is more adaptable to the changing needs or demands of its users or clients.
Scaling the network means creating a network design for the present and the future, and both. We do
not need to redesign the whole project in time, only small changes can be made at the request of the
organization, if the scaling was done at the beginning. In my project, I also scaled the network to
consider the changes that might arise in the future, and to adapt the possibilities of future preferences.

24
Dinisha Nath (HND / First Semester)
Networking 2019

Feedback from Users:


Independent feedback

Project name: Nepal Bangladesh Bank Networked system

Feedback Given By: Sarthak Dhungel Signature:

Date:
Project Description: The project was built to establish a connection between the head office located in
Kathmandu and the branches of Nepal Bangladesh Bank Limited. This was possible only on
different servers as a DHCP server, a DC server, a RODC server, a CDC server, a VPN server, etc.

Important features of the project:


Communication takes place in private networks, and in this network system a virtual network of the
main office and a branch of using VPN are implemented. It also has a character like a domain-based
network system, since it helps all the other computer to become a member of the core server and
easily approach files and the required data.
Checklists Yes No Comment

Have recognized objects and data structures required to the


system?
Does the prepared design meets the requirement of client
Is security was good enough?
Does network system contain scalability i.e. suitable for further
use in future?
Is the networked system flexible?
Is it easy to operate?
Is it reliable?

Project Limitation Despite its various advantages, it does not have a secondary DNS. This is
a small unpleasant difference or error when preparing a network design.
However, this can be fixed.
Feedback Evaluation
Feedback Evaluated Signature:
By: Dinisha Nath

Date:

25
Dinisha Nath (HND / First Semester)
Networking 2019

Evaluation of the system: The overall assessment of the system determines that the result is good,
while some restrictions also come, which can soon be met as soon as possible.

Recommendations for future consideration: The key factors that determine the network system
are scalability, which can be changed to meet the requirements of the organization. The prepared
network system should be timely updated, updated and analyzed by time to increase it in the future.

Lab Report:
A. Domain Controller (DC):
1. Introduction:
A domain controller (DC) is a server that responds to security authentication requests
within a Windows Server domain. It is a server on a Microsoft Windows or Windows NT network
that is responsible for allowing host access to Windows domain resources.
A domain controller is the centerpiece of the Windows Active Directory service. It authenticates
users, stores user account information and enforces security policy for a Windows domain.

2. Prerequisites for Domain Controller (DC):


 Server Operating System
 Static IP/ Fixed IP
 Active Directory Domain Services

3. Steps For DC:

I. Firstly open Server OS as


an administrator, then
open run and type
ncpa.cpl.

26
Dinisha Nath (HND / First Semester)
Networking 2019

II. Then, open Ethernet and


then properties and click
on properties of IPV4.

27
Dinisha Nath (HND / First Semester)
Networking 2019

III. Assign static IP address


(use the same address in
DNS server as well).

IV. Now open server


manager and click on
manage and Add Roles
and Features.

28
Dinisha Nath (HND / First Semester)
Networking 2019

V. Click on next and


enable option Role-
based installation.
Again click on next.

VI. Now click on option to


select a server from the
server pool and click on
next.

29
Dinisha Nath (HND / First Semester)
Networking 2019

VII. Now click on Active


Directory Domain Services
and click on Add Features.

VIII. Click on next 2 times.

IX. Click on next and enable the


option restart the destination
server automatically.

30
Dinisha Nath (HND / First Semester)
Networking 2019

X. After that, in this


message box click on
yes and install.

XI. After installation


succeeds the Server OS
will restart.

XII. Now click on server


manager, click on
notifications and click
to promote this server
to a domain controller.

31
Dinisha Nath (HND / First Semester)
Networking 2019

XIII. Then after select


option add a new
forest, provide domain
name nbbl.com.np
and click on next.

XIV. Now provide strong


password to Domain
Server and click on
next.

32
Dinisha Nath (HND / First Semester)
Networking 2019

XV. Leave as default and


click on next.

XVI. Click on next for 3


times.

XVII. Now click on install


and after installation
Server OS will restart.

33
Dinisha Nath (HND / First Semester)
Networking 2019

4. Testing:
I. Open dsa.msc and
press ok.

II. Then we can see that


our domain name
nbbl.com.np where
we can create, apply,
manage groups,users
policies.

III. Now we ping Domain


name of From DOS.

34
Dinisha Nath (HND / First Semester)
Networking 2019

B. Domain Name System (DNS):


1. Introduction:
Domain name system (DNS) is a hierarchical naming system built on a distributed database.
This system transforms domain names to IP addresses and makes it possible to assign domain
names to groups of Internet resources and users, regardless of the entities' physical location.
DNS assigns domain names and maps the names to IP addresses by designating an authoritative
name server for each domain. These servers are responsible for particular domains and can
assign the authoritative name servers to subdomains.

2. Prerequisites of DNS:
 Active Directory Domain Services
 DNS server services

3. Step for DNS

I. After that click on tools and


then DNS.

II. Right click on Forward


Lookup Zone and add a
new zone.

35
Dinisha Nath (HND / First Semester)
Networking 2019

III. Click on next and select the


option Primary zone then
click on next.

IV. Select option to all DNS


servers running on domain
and click on next.

V. Provide zone name


(nbbl.net.np) and click on
next.

36
Dinisha Nath (HND / First Semester)
Networking 2019

VI. Select an option Allow only


secure dynamic updates and
click on next.

VII. Click on Finish.

VIII. Now right click on Reverse


Lookup Zone and create a
new zone.

37
Dinisha Nath (HND / First Semester)
Networking 2019

IX. Click on next set to primary


zone and click on next and
again next.

X. Select IPV4 Reverse


Lookup Zone and click
next.

XI. Provide network ID and


click next.

38
Dinisha Nath (HND / First Semester)
Networking 2019

XII. Finish.

XIII. Then open ncpa.cpl

39
Dinisha Nath (HND / First Semester)
Networking 2019

XIV. Now go to Ethernet


properties >>IPV4
properties.

XV. Now click on advanced


properties.

40
Dinisha Nath (HND / First Semester)
Networking 2019

XVI. Then in IP Settings press


Add button.

XVII. Now add IP address


(200.200.200.1) and use
network Id used in reverse
lookup zone. Then click on
add and then click on ok snd
close.

41
Dinisha Nath (HND / First Semester)
Networking 2019

XVIII. After closing open DNS


Manager and in Forward
Lookup Zone right click on
given website name and
click New Host(A or
AAA)…

XIX. Now in Name type www, in


IP address provide IP
address that we had set on
IP settings and enable both
options and click Add Host.

XX. Then this message is shown


and then click on ok.

42
Dinisha Nath (HND / First Semester)
Networking 2019

XXI. Then click Done.

5. Testing

I. Open DOS and ping


website name and its IP
address.

43
Dinisha Nath (HND / First Semester)
Networking 2019

II. Here (200.200.200.1) is


also an IPV4 address.

C. IIS Server
1. Introduction:
Internet Information Services (IIS) is a flexible, general-purpose web server. An IIS web
server accepts requests from remote client computers and returns the appropriate
response. This basic functionality allows web servers to share and deliver
information across local area networks, such as corporate intranets, and wide area
networks, such as the internet. It runs on the Microsoft .NET platform on the Windows OS.
It supports a variety of resources that let developers create applications to configure, manage,
and extend the functionality of IIS servers.

2. Prerequisites for IIS Server


 ADDS
 DNS Server
 IIS Server Services
 Web Server
 A Website

44
Dinisha Nath (HND / First Semester)
Networking 2019

3. Steps for IIS Server

1. At first go to C: drive and


create a new folder.

2. Name the Folder as nbbl.

3. Then create new text


document inside folder nbbl
and rename text file as
nbbl.txt.

4. Now inside that text write


something and go to File and
Save as.

45
Dinisha Nath (HND / First Semester)
Networking 2019

5. Save the text file as nbbl.html.

6. Now we have already


provided IP address for
nbbl.net.np website from DNS
Server above. So now we go to
Server Manager.

7. Now open Server Manager


click on Manage then click on
Add Roles and Features and
Next.

46
Dinisha Nath (HND / First Semester)
Networking 2019

8. Now select option Role Based


and then Next.

9. Enable option select a server


from the server pool and click
Next.

10. Now enable option Web


Server and click Next.

11. Click on Next and Install.

47
Dinisha Nath (HND / First Semester)
Networking 2019

12. Then we open Tools and click


on Internet Information Services
(IIS Manager).

12. Now inside IIS right click on


Sites and click Add Website.

13. Then provide site name


www.nbbl.com,select physical
path of nbbl folder and click
ok. Then provide IP address
200.200.200.1 in binding and
click OK.

48
Dinisha Nath (HND / First Semester)
Networking 2019

14. Now click on that website and


double click on Default
Document.

15. Remove all the files present


inside Default Document.

16. Right click and add a new


document.

17. Then name the document as


nbbl.html and click on OK.

49
Dinisha Nath (HND / First Semester)
Networking 2019

I. Testing

1. Open the explorer and hit


website name that we had
provided (www.nbbl.com).

2. Open DOS and ping IP address


and website name.

D. DHCP Server
I. Introduction::

DHCP stands for "Dynamic Host Configuration Protocol." DHCP is a protocol that
automatically assigns a unique IP address to each device that connects to a network. With
DHCP, there is no need to manually assign IP addresses to new devices. This is the network
management protocol used to dynamically assign an IP address on any device or node on the
network so that they can communicate using IP. DHCP automates and centrally manages
these configurations, and does not require that network administrators manually assign IP
addresses to all network devices.

II. Prerequisites for DHCP Server:


 ADDS
 DHCP Server Services

50
Dinisha Nath (HND / First Semester)
Networking 2019

 Client Operating System

III. Steps for DHCP:

1. Open Server
Manager add roles
and features and
click on Next.

2. Select Role-based
and click Next.

51
Dinisha Nath (HND / First Semester)
Networking 2019

3. Select option server


from server pool
and Next.

4. Enable option
DHCP server and
click on next for 3
times
continusously.

52
Dinisha Nath (HND / First Semester)
Networking 2019

5. Enable option
restart server if
required and install.

6. After installing
DHCP open Server
Manager>>Tools>
> DHCP.

7. Inside DHCP open


server name and
right click of IPV4
and click on New
Scope and then
next.

53
Dinisha Nath (HND / First Semester)
Networking 2019

8. Name the server as


dhcp and next.

9. Provide start and


end IP address
different from static
IP and click on next
for 2 times.

54
Dinisha Nath (HND / First Semester)
Networking 2019

10. Set the time


duration for scope
leases and click on
next.

11. Provide your Server


name and Static IP
address click on
next foe 2 times.

55
Dinisha Nath (HND / First Semester)
Networking 2019

12. Select option Yes


then click on next
and finish.

13. Here is our Address


Pool IP address
needed to provide
for client OS.

56
Dinisha Nath (HND / First Semester)
Networking 2019

14. Now Install Client


OS and type
ncpa.cpl at Run
window and double
click.

15. Go to properties
and select IPV4
then double click it.

57
Dinisha Nath (HND / First Semester)
Networking 2019

16. Now enable option


obtain IP address
and DNS server
automatically and
click on OK and
close

17. Now at top of the


virtual machine and
click on VM and
then Settings.

58
Dinisha Nath (HND / First Semester)
Networking 2019

18. Now click on


Network Adapter
then Lan Segment
then click on Add
LanSegment1 then
OK for 2 times
Then Add Lan
segment 1 on both
Server OS and
Client OS.

DHCP relay agent:

19. Go to VM and click on


Settings.

59
Dinisha Nath (HND / First Semester)
Networking 2019

20. Click on Add then


Network Adapter and
Finish.

21. Add Lan Segment>>OK.

60
Dinisha Nath (HND / First Semester)
Networking 2019

22. We see that there is next


network card then click
on Properties.

23. Double click on IPV4.

61
Dinisha Nath (HND / First Semester)
Networking 2019

24. Now provide IP address


of 200.200.200.1 for
second network card then
click on OK then Close.

25. Then go to server


manager click on
Manage then select Add
Roles and Features.

26. Next.

62
Dinisha Nath (HND / First Semester)
Networking 2019

27. Click on next enable


option Remote Access
then Next.

28. Click on next for 3 times


then Enable option
Direct Access and VPN
and Routing and then
Next.

29. Install.

63
Dinisha Nath (HND / First Semester)
Networking 2019

30. Open Tools and click on


Remote Access
Management.

31. Click on Direct Access


and VPN and Run the
getting started wizard.

64
Dinisha Nath (HND / First Semester)
Networking 2019

32. Click on Deploy VPN


only.

33. Right click on server


name then select
Configure and Enable
remote access then Next.

34. Enable Remote access


then Next.

65
Dinisha Nath (HND / First Semester)
Networking 2019

35. Enable option VPN and


Next.

36. Select Ethernet1then


Next.

37. Automatically then click


on Next.

66
Dinisha Nath (HND / First Semester)
Networking 2019

38. Select option No then


Next and Finish.

39. Open IPV4 then click on


DHCP Relay Agent and
select New Interface.

67
Dinisha Nath (HND / First Semester)
Networking 2019

40. Select Ethernet1 then ok


for 2 times.

41. Now again right click


IPV4 then select New
Interface then select
Ethernet0 and ok for 2
times.

68
Dinisha Nath (HND / First Semester)
Networking 2019

42. Now in VM then Settings


then add Lan Segment2
for ethernet1and OK.

43. Now open DHCP click


on IPV4 then select New
Scope.

69
Dinisha Nath (HND / First Semester)
Networking 2019

44. Next then write name


as lan2 and then
Next.

45. Provide Start IP


address and End IP
address then Next.

46. Click on next for 3


times .

70
Dinisha Nath (HND / First Semester)
Networking 2019

47. Select option Yes


then Next.

48. Click on Next then


Provide Server Name
and also IP Address
then next for 2 times.

71
Dinisha Nath (HND / First Semester)
Networking 2019

49. Select option Yes


then next and finish.

50. Look into DHCP


address pool.

51. Go into client OS and


click on VM then
Setting.

72
Dinisha Nath (HND / First Semester)
Networking 2019

52. Network Adapter


then Add
LanSegment2 then
OK.

IV. Testing

73
Dinisha Nath (HND / First Semester)
Networking 2019

1. We see that Client


OS is receiving an
IP address .

2. In Client OS is
receiving reply
from Server OS.

74
Dinisha Nath (HND / First Semester)
Networking 2019

3. Now open DHCP


select in the scope
of 200.200.200.0
(Lan2) client OS
is receiving the IP
address.

4. Now in client OS
we see that it is
receiving IP of
200.200.200.2.

5. Pinging and reply


came from server
OS to Client OS.

75
Dinisha Nath (HND / First Semester)
Networking 2019

E. Print Server
I. Introduction:
A print server is a device that connects printers to client computers over a network. It accepts print
jobs from the computers and sends the jobs to the appropriate printers, queuing the jobs locally to
accommodate the fact that work may arrive more quickly than the printer can actually handle. Print
servers are connected to a computer network in order to serve the need for printing jobs in a network
that may contain more than one printer.

II. Prerequisites for Print Server


 ADDS
 DHCP
 Print Server Services
III. Steps for Print Server

1. Go to the server
manager then click on
Manage select Add
Roles and Features then
next.

76
Dinisha Nath (HND / First Semester)
Networking 2019

2. Next.

3. Select option Print and


Document Services
then click next 2 times.

4. Enable option Print


Server only and click
next.

77
Dinisha Nath (HND / First Semester)
Networking 2019

5. Install.

6. Open Server Manager


select Print
Management.

7. Now Open print


servers then right click
on Printers then click on
Add a new printer then
select the option Create
a new port then Next.

78
Dinisha Nath (HND / First Semester)
Networking 2019

8. Select an option Install


a new driver then Next.

9. Now select
Manufacturer and
Printers then Next.

10. Enable option Share


this printer then next for
2 times.

79
Dinisha Nath (HND / First Semester)
Networking 2019

11. Finish.
Then install Client OS
and create the network
between both Server OS
and Client OS through
DHCP.

12. Now in Client OS Go to


Run and write IP
address of Domain
Server then OK Then
provide Domain
Credentials.

13. Right click on Samsung


Driver and click
Connect.

80
Dinisha Nath (HND / First Semester)
Networking 2019

IV. Testing

1. Open Control Panel


then select Hardware
and sound then Devices
and Printers. We can
see that our printer is
installed.

2. Pinging the Domain IP


address from Client OS.

81
Dinisha Nath (HND / First Semester)
Networking 2019

F. VPN Server
I. Introduction
A Virtual Private Network (VPN) is a network technology which extends private network over a public
network such as Internet. A VPN allows a computer to be connected securely as if they are physically
wired together. Corporations use VPN to allow remote workers to connect securely to their private
network. It is mainly used for security purposes and it is used by ISP, Telecom, Bank, UN etc. IPsec
primarily utilizes tunnel mode for creating VPN tunnels.

II. Prerequisites for VPN Server


 ADDS
 Two Network Card
 Internet Connections
 Server OS
 Client OS

III. Steps for VPN Server

1. Go to Server Manager
then select Add Roles
and Features then Next.

82
Dinisha Nath (HND / First Semester)
Networking 2019

2. Next.

4. Select the
option
Remote
access
and click om next

83
Dinisha Nath (HND / First Semester)
Networking 2019

5. Click on next.

6. Select the option


Direct access and
VPN and click on
next

84
Dinisha Nath (HND / First Semester)
Networking 2019

7. Select the option


restart the
destination server
and click on
install.

8. After installation
succeeds. Open
server manager go
to tools and select
the option remote
access
management

85
Dinisha Nath (HND / First Semester)
Networking 2019

9. Click on server and


select the option
run the getting
started wizard.

10. Select the option


Deploy VPN only

86
Dinisha Nath (HND / First Semester)
Networking 2019

11. Right Click on the


server name and
select the option
configure and
enable routing and
remote access
option

87
Dinisha Nath (HND / First Semester)
Networking 2019

12. Click on next

13. Select the


option Remote
Access
and click on
next

88
Dinisha Nath (HND / First Semester)
Networking 2019

14. Select the


option VPN
and click on
next.

15. Select the

89
Dinisha Nath (HND / First Semester)
Networking 2019

Ethernet1 and
click on next.

16. Select the


option
automatically
and click on
next

90
Dinisha Nath (HND / First Semester)
Networking 2019

17. Select the


option No,
Use routing
and remote
access option
and click on
next

18. Click on finish.

91
Dinisha Nath (HND / First Semester)
Networking 2019

19. Open Client


And Go to
control panel
and select the
option
network and
internet.

20. Click on
the
option
Networking
and sharing
center.

92
Dinisha Nath (HND / First Semester)
Networking 2019

21. Click on Set


up a new
connection or
network.

22. Select the option


Connect to a
workplace and
click on next

93
Dinisha Nath (HND / First Semester)
Networking 2019

23. Select the


option Use my
internet
connection
(VPN).

24. Select the


option I’ll Set
up an
internet
connection
later.

94
Dinisha Nath (HND / First Semester)
Networking 2019

25. Provide the IP


address and
Destination
name and
click on create

26. Right click on


VPN
connection
and Select the
option
Connect.

95
Dinisha Nath (HND / First Semester)
Networking 2019

IV. Testing

1. Click on connect>>
Provide Username
and password>>Ok.

G. RODC

I. Introduction:
A read-only domain controller (RODC), It is mainly used for backup of domain, domain
monitoring. Here system administrator can read only data but cannot change its security
policies. It is a helping assistance domain and it is used in branch offices. RODC is like
clone of a
Primary Domain Controller. Here data is replicated. When we create the user in Primary
Domain Controller the user is replicated into Read Only Domain Controller. But we
cannot create or delete the user from Read Only Domain Controller. It just reads the data.

II. Prerequisites for RODC


• Primary Domain Controller
• 2nd Server Operating System

96
Dinisha Nath (HND / First Semester)
Networking 2019

III. Steps for RODC


1. First we have to install
ADDS and configure it
with nbbl.com.np
which has been already
completed. Now in next
Server Operating
System we configure
RODC.

First in second Server


OS assign IP address
192.168.100.2 and in
preferred DNS address
assign 192.168.100.1
which is Server OS 1
Domain IP
address>>OK>>close.

2. Open server manager


then Manage then Add
Roles and Feature then
next.

97
Dinisha Nath (HND / First Semester)
Networking 2019

3. Next.

98
Dinisha Nath (HND / First Semester)
Networking 2019

4. Select ADDS then click


next 3 times.

5. Install.

6. Now before promoting


server block the firewall
of both Server OS.

99
Dinisha Nath (HND / First Semester)
Networking 2019

7. VM>>Settings.

8. Keep the LanSegment1


in both Server OS.

100
Dinisha Nath (HND / First Semester)
Networking 2019

9. In Server OS 1 assign
preferred DNS address
of Server OS then ok
and close.

10. Now ping IP address of


Server OS 2 from
Server OS 1.

101
Dinisha Nath (HND / First Semester)
Networking 2019

11. Again ping IP address


of Server OS 1 from
Server OS 2.

12. In server OS 2 Promote


to a domain controller.

13. Now enable option add


a domain controller to
existing domain then
Select then provide
credentials then OK.

102
Dinisha Nath (HND / First Semester)
Networking 2019

14. Select domain name


then click OK then next.

15. Enable option RODC


then Provide password
then Next.

103
Dinisha Nath (HND / First Semester)
Networking 2019

16. Now go to Server OS


1search dsa.msc then
right click of users then
New then User

17. In Replicate from select


domain name then for 2
times.

104
Dinisha Nath (HND / First Semester)
Networking 2019

18. Click on next and install

H. Testing

1. It is the Server OS 2
and I had created user
rajesh in Server OS 1
and here it is replicated.

105
Dinisha Nath (HND / First Semester)
Networking 2019

2. We can’t add Users in


RODC.

3. Here domain name is


cloned in Server OS 2.

H. CDC

I. Introduction

CDC stands for Child Domain Controller which is also a helping domain of Primary
Domain Controller as that of RODC. It helps to reduce the data loads in PDC. Like that of
in RODC, Data will not be replicated in Child Domain. Here CDC updates the information
to PDC and PDC will monitor it. CDC is used by a large organization. Child domains are
used to accomplish network management goals, such as structuring the network, removing
problems of a network.

106
Dinisha Nath (HND / First Semester)
Networking 2019

II. Prerequisites for CDC


• Primary Domain Controller
• 2nd Server OS with static IP

III. Steps for CDC

1. First Step : Install


ADDS on 2nd Server
OS

After that in Server


OS 2 go to the
Server Manager
Notifications and
click on Promote
this server to a
domain controller.

107
Dinisha Nath (HND / First Semester)
Networking 2019

2. Select option Add a


new domain to an
existing forest.
Provide the required
credentials and
enter the child
domain name. and
click on next

3. Provide a
strong
password.

108
Dinisha Nath (HND / First Semester)
Networking 2019

4. Click Next

5. Check your
NetBIOS domain
name and click on
next.

109
Dinisha Nath (HND / First Semester)
Networking 2019

6. Next>>
After successfully
checking
prerequisites, click
on install

110
Dinisha Nath (HND / First Semester)
Networking 2019

IV. Testing

1. Now we can login


from CDC.

2. In My Computer
Properties We can
see our CDC.

111
Dinisha Nath (HND / First Semester)
Networking 2019

3. Here We Can See that


we can create new
user and groups but
we can also see that
user and groups
have not been
replicated from the
PDC

I. WDS

I. Introduction
Windows Deployment Services is a server role that gives administrators the ability to
deploy Windows operating systems remotely. It is mostly used by large scale
organizations. It enables remote installation of Windows over the network. Windows
Deployment Services is used for remotely deploying the Windows like Windows10,
Windows8, 7, Windows XP etc.

II. Prerequisites for WDS

• ADDS
• DHCP
• PXE bootable LAN Card
• ISO Image file

III. Steps for WDS

112
Dinisha Nath (HND / First Semester)
Networking 2019

roles and

1. Open Server Manager. Go to


manage and select the
option Add features.

5. Next>>Next>>
Select both options and
click on next

113
Dinisha Nath (HND / First Semester)
Networking 2019

6. Select the option restart the


destination server and
click on install

7. Open server manager go to


tools and select the option
windows deployment
services.

114
Dinisha Nath (HND / First Semester)
Networking 2019

8. Expand Server Option.


Right Click on the server
name and choose the
option Configure server

9. Click on Next

option

115
Dinisha Nath (HND / First Semester)
Networking 2019

10. Select the

integrated with active


directory and click on next

11. Give the path location of


remote installation file.

116
Dinisha Nath (HND / First Semester)
Networking 2019

12. Select the option Respond


to all client computers.
Also Enable option
requires administration
approval and click on
Next.

13. Select the option add


images to the server now
and click on finish.

117
Dinisha Nath (HND / First Semester)
Networking 2019

14. In add image wizard give


path location for the image
file and click on next

15. Create a image group name


and click on next

118
Dinisha Nath (HND / First Semester)
Networking 2019

16. Click on next.

17. Next>>Next.

18. Right Click on Boot image


select the option add boot
image and add boot image
file from remote
installation folder

119
Dinisha Nath (HND / First Semester)
Networking 2019

19. Right click on the server


name and select the option
properties

20. In properties go to boot


menu and enable the option
require the user to press the
F12 key to continue the
PXE boot for both known
and unknown clients. Then
click on apply and on OK.

120
Dinisha Nath (HND / First Semester)
Networking 2019

IV. Testing

1. When we boot client gets IP


address from DHCP
Server.

Analyzing the result:


Network Connectivity Testing
What was tested: Network connectivity was tested Date:12/06/2018

S.N Expected output Actual output

i. The target computer must provide the answer The target computer provides a specific
after the ping. answer.

121
Dinisha Nath (HND / First Semester)
Networking 2019

Analysis:
Each ping makes 4 attempts and provides a response for each attempt. In the above test, too much
response was received, which indicates that the connection test was successful.

Testing of the domain:


What was tested: Domain was tested Date: 10/11/2018

S.N Expected output Actual output

ii. We should see name of domain we created in the user The server displays the name of the
and group formation. created domain.

122
Dinisha Nath (HND / First Semester)
Networking 2019

Analysis:
When we restarted the server domain name was tested.

Analysis:
The printer accesses all the members of the client.

Print server:
What was tested: Print server Date: 10/11/2018

S.N Expected output Actual output

vi. All the clients must be able to use the printer. The client computers access the printer.

123
Dinisha Nath (HND / First Semester)
Networking 2019

Analysis:
The printer accesses all the members of the client.

VPN test:
What was tested: VPN Date: 10/11/2018

S.N Expected output Actual output

vii. The answer should be obtained after the ping when you connect The answer was received
to a private Network after ping.

124
Dinisha Nath (HND / First Semester)
Networking 2019

Analysis:
The answer was received after ping, which means on the same network, which means that the VPN
has been tested.

Conclusion:
In the above task, I completed the analytical report against the expected result, given the number of
the test log test, those that were tested, the expected result and the actual result.

125
Dinisha Nath (HND / First Semester)

You might also like