Networking Assignment
Networking Assignment
Contents
Part 1 ...................................................................................................................................................... 4
Introduction: ..................................................................................................................................... 4
Conclusion: ..................................................................................................................................... 20
Part 2 .................................................................................................................................................... 21
Introduction: ................................................................................................................................... 21
1. Introduction: .............................................................................................................................. 26
4. Testing: ..................................................................................................................................... 34
1. Introduction: .............................................................................................................................. 35
1
Dinisha Nath (HND / First Semester)
Networking 2019
5. Testing....................................................................................................................................... 43
1. Introduction: .............................................................................................................................. 44
I. Testing....................................................................................................................................... 50
I. Introduction::............................................................................................................................. 50
I. Introduction: .............................................................................................................................. 76
I. Introduction ............................................................................................................................... 82
G. RODC .......................................................................................................................................... 96
I. Introduction: .............................................................................................................................. 96
2
Dinisha Nath (HND / First Semester)
Networking 2019
I. WDS........................................................................................................................................... 112
3
Dinisha Nath (HND / First Semester)
Networking 2019
Part 1
LO1 Examine networking principles and their protocols.
You will need to produce a report for the CEO that includes the following:
2. An explanation of networking principles, protocols and devices, including benefits and constraints
of networked solutions, the impact of network topology, communication and bandwidth requirements,
effectiveness of networking systems, operating principles of networking devices and server types and
networking software.
Introduction:
Networking is the way of communicating between various device with using various medium. It is a
group of two or more computers connected with each other for sharing resources and information. A
simple computer network can be built only from two computers while a complex computer network
can be built from several thousand computers.
4
Dinisha Nath (HND / First Semester)
Networking 2019
It is easier to set up and use this means that you can spend less time in
the configuration and implementation of peer to peer network.
It is not require for the peer to peer network to use the dedicated server
computer. Any computer on the network can function as both a network
server and a user workstation.
It is wide area networking where number of server will manage networking with other
workstation. It is kind of distributed database which is used for long range connection.
Client computers provide an interface to allow a computer user to request services of
server and display the results the server returns. Server wait for requests to arrive from
clients and then respond to them.
All the files are stored at the same place. In this way, management of
files becomes easy. Also it becomes easier to find files.
5
Dinisha Nath (HND / First Semester)
Networking 2019
Changes can be made easily by just upgrading the server. Also new
resources and systems can be added by making necessary changes in
server.
Too many requests from the clients may lead to congestion, which rarely
takes place in P2P network. Overload can lead to breaking-down of
servers.
Too many requests from the clients may lead to congestion, which rarely
takes place in P2P network. Overload can lead to breaking-down of
servers.
A local area network (LAN) is a computer network that interconnects computers within
a limited geographical area such as a home, school, computer laboratory, or office
building using network media. The main aim of LAN is to share computer hardware,
software and data. In LAN workstations are connected to a server.
Advantages of LAN:
6
Dinisha Nath (HND / First Semester)
Networking 2019
User can communicate with each other and transfer data workstations
very easily.
User can save their work centrally on the network’s file server. This
means that they can retrieve their work from any workstation.
Disadvantages of LAN:
Special security measures are needed to stop users from using programs
and data that they should not have access to.
If the file server develops a serious fault, all the users are affected.
Advantages of MAN:
Disadvantages of MAN:
7
Dinisha Nath (HND / First Semester)
Networking 2019
Advantages of WAN:
Everyone on the network can use the same data. This avoids problems
where some users may have older information than others.
Disadvantages of WAN:
8
Dinisha Nath (HND / First Semester)
Networking 2019
Security is a real issue when many different people have ability to use
information from other computers. Protection against hackers and
viruses adds more complexity and expenses.
i. OSI model:
The Open Systems Interconnection (OSI) Model is a conceptual and logical layout that
defines network communication used by systems open to interconnection and
communication with other systems. The model is broken into seven subcomponents, or
layers, each of which represents a conceptual collection of services provided to the
layers above and below it. The OSI Model also defines a logical network and effectively
describes computer packet transfer by using different layer protocols.
The seven layer of OSI model are:
1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
It is a layered model. Changes are one layer do not affect other layers,
provided that the interfaces between the layers do not change drastically.
9
Dinisha Nath (HND / First Semester)
Networking 2019
The launching timing of this model was inappropriate. When OSI appeared,
the TCP/IP protocols were already implemented. So, the companies were
initially reluctant to use it.
Though there are many layers, some of the layers like the session layer and
presentation layer have very little functionality when practically deployed.
10
Dinisha Nath (HND / First Semester)
Networking 2019
Network Topology:
In computer network, topology is the way in which various components of a network (like nodes, links,
peripherals, etc.) are arranged. The way in which different systems and nodes are connected and
communicate with each other is determined by topology of network. Topology is the physical layout
of nodes work stations and cables in the local area network.
11
Dinisha Nath (HND / First Semester)
Networking 2019
1. Bus topology:
A bus topology is the simplest of network topologies. In this type of topology, all the nodes are
connected to the single coaxial cable, by the help of interface connectors. This central cable is
the backbone of the network and is known as Bus. Every workstation communicates with the
order device through this Bus. A signal from the sources is broadcast and it travels to all
workstation connected to the bus cable.
Its functions only transmit data in only one direction stream, and each device is connected to one cable.
It is easy to set-up and extend bus network. Cable length required for this topology is the latest
compared to other topology. Dependency on the central cable in this topology has its disadvantages.
If the main cable encounters some problem, the whole network breaks down. If network traffic is
heavier, it is more likely to fall on network performance.
2. Ring Topology:
A ring topology is a network configuration in which device connections create a
circular data path. Each networked device is connected to two others, like points on a circle. In
ring topology, all the nodes are connected to each-other in such a that they make a closed loop.
Each workstation is connected to two other components on either side, and it communicates
with these two adjacent neighbors. Data travels around the network, in one direction. Sending
and receiving of data takes place with the help of token. Token contains a piece of information
which along with data is sent by the source computer.
12
Dinisha Nath (HND / First Semester)
Networking 2019
3. Star Topology:
Star topology is a network topology where each individual piece of a network is attached to a
central node (often called a hub or switch). The attachment of these network pieces to the
central component is visually represented in a form similar to a star. Unlike bus topology,
where nodes are connected to central cable, here all the workstations are connected to central
devices with the point-to-point connection. So it can be said that every computer is indirectly
connected to every other node with the help of “hub”.
13
Dinisha Nath (HND / First Semester)
Networking 2019
4. Mesh Topology:
In a mesh topology, each of the network node, computer and other devices are interconnected
with one another. Every node not only sends its own signals but also relays data from other
nodes. In fact a true mesh topology is one where every nodes is connected to every other nodes
in the network. This type of topology is very expensive as there are many redundant
connections. Thus it is not mostly used in computer networks.
Its functions are completely connected, powerful. It is not flexible. It carries its own data load. The
error is easily recognized. Installation and configuration are complex, but provide confidentiality and
security. The cost of cables is more. Assembly is required. Data can be transmitted from different
devices simultaneously. This topology can withstand high traffic. Set-up maintenance of this topology
is vry difficult. Even administrator of network is tough.
14
Dinisha Nath (HND / First Semester)
Networking 2019
5. Tree Topology:
A topology that has a root node and all other nodes that are connected to it, builds a hierarchy,
is called the topology of the tree. It is also known as a hierarchical topology. It contains three
levels of the hierarchy. This is a connection of topologies, such as a linear bus and a star,
including systems with a topology of stars connected to the main line bus cable. This topology
is also known as the extended star topology.
This method are widely used in the global network and are complete if workstations are in groups or
not. It uses the expansion of buses and star topologies. This also helps in the growth of nodes, is a
possible and simple way. It is easy to handle and manage. Error detection can be found easily. It is
expensive and hard to connect to the cable. Maintenance is difficult if the nodes are added as if the
central hub falls, the network drops.
6. Hybrid Topology:
Hybrid topology is an interconnection of two or more basic network topologies, each of which
contains its own nodes. The resulting interconnection allows the nodes in a given basic
topology to communicate with other nodes in the same basic topology as well as those in other
basic topologies within the hybrid topology. When different topologies are related to each
other, they do not reflect the characteristics of any particular topology. “For example, if one
department of the ring topology is worn out, and in another category the stellar topology is
worn in the office, a combination of these two departments will lead to a hybrid topology (ring
topology and stellar topology). This is a scheme that combines a set of topologies into a large
topology.
15
Dinisha Nath (HND / First Semester)
Networking 2019
Its peculiarity consists in the fact that it consists of two topologies. Get both the advantages and
disadvantages of topologies that are included. It is defined as the detection of errors and is easily
removed and effective. Adaptable as a size can be easily increased. It is regulated. The design is
complex and expensive to connect.
Networking Devices:
A computer network is a collection of collective network devices that are well organized to share data.
Network devices are devices necessary for network management, network binding, packet routing.
Communicate with others, share files on the network and much more. The different networking devices
are:
i. Server:
This is a computer program that serves the program for another computer program and
its user. It provides data systems on a local area network (LAN) or a wide area network
(WAN) filled with the Internet. For example: a web server, a mail server, a file server,
etc. A simple server property is to visit the port for incoming network requests and a
good presentation.
ii. Hub:
A hub refers to a hardware device that enables multiple devices to be connected to a
computer. It is the most basic networking device that connects multiple network devices
together. Unlike a network switch or router, a network hub has no routing tables or
intelligence on where to send information and broadcasts all network data across each
connection. Most hubs can detect basic network errors such as collisions, but having all
information broadcasts to multiple ports can be a security risk and cause bottlenecks.
16
Dinisha Nath (HND / First Semester)
Networking 2019
iii. Switch:
A network switch is a small hardware device that joins multiple computers together
within one local area network(LAN). Network switches appear nearly identical to
network hubs, but a switch generally contains more intelligence than a hub. Unlike
hubs, network switches are capable of inspecting data packets as they received. By
delivering messages only to the connected device intended, a network switch conserves
network bandwidth and offers generally better performance then a hub.
iv. Router:
A router is a tiny electronic device that connects collective computer networks to each
other through wired or wireless connections that examine the contents of data packets
being transmitted on the network or in other networks. It works by downloading the
configuration file, and then configures the network interface. It adds network addresses
for each to its routing table.
v. Repeaters:
This is an electronic network device that relays the received signal with a higher
bandwidth and a prolonged network barrier than what can be with the original signal.
It is connected to the network line of the device used in two network nodes between
two-way operations for the transmission of physical signals. For the same two types of
network connection, the main goal is to extend the network transmission distance from
the data signal for sending or forwarding.
vi. Bridge:
A bridge is a hardware device for linking two networks that work with the same
protocols. Unlike a repeaters, which works at the physical level, bridge works at logical
level, which means that it can filter frames so that it only lets past data whose
destination address corresponds to a machine located on the other side of the bridge.
vii. Modem:
It is a device or program that provides a computer for transferring data and files over a
telephone or cable line. The term "modem" is combined with modulation and
demodulation, since it performs and modulates and demodulates analog carrier signals
to encode and decode digital information for conversion. It helps to send and receive
digital information between personal computers.
17
Dinisha Nath (HND / First Semester)
Networking 2019
Server Types:
A computer program that provides various services to other computer programs (and its users) is a
server. Whenever computers share resources with client machines, they are considered servers,
because they are unlikely to perform any other tasks than their server tasks. He is responsible for
managing network resources. Dedicated server has high-performance memory, faster processor.
i. Web Server:
A program that needs a hypertext transfer protocol (HTTP) to provide content or
services to end users via the Internet is called a web server. Basically, a web server
consisting of a physical server, a server operating system (OS) and software, must
provide an HTTP connection. It is also known as an Internet server. The web server is
responsible for hosting the website files.
ii. File Server
A file server is a server that facilitates the approach to files that act as a central file store so
that other computers can access files on the same network. It provides the user with the
ability to transfer information over the network without physically transferring files to
another external storage device. Typically, an FTP server (File Transfer Protocol) is used
when transferring files.
iii. Database Server:
The database server refers to the software and hardware used to start the database. It is
identical to the data store where the website stores or stores its data and information. In
the database, the network client sends SOL requests (a structured query) to the database
server, after which the result query is returned over the network.
iv. Virtualization:
v. This refers to creating a virtual resource, such as a server, desktop, operating system,
file, storage, or network. This is a storage device or network resources. Its feature is the
controlled workload by transferring traditional calculations to make it more scalable.
Since it does not require the installation of hardware components, it is a cheaper system
for implementation. This reduces the load. This allows you to quickly deploy resources.
It offers the best uptime.
18
Dinisha Nath (HND / First Semester)
Networking 2019
19
Dinisha Nath (HND / First Semester)
Networking 2019
Server software is usually designed to connect to the server hardware, as well as to the processor,
memory, memory and other communication ports. Different types of servers are a web server, an
application server, a file server, etc. However, the server software also needed to install some operating
system for the proper functioning of the functions. The OS that was created to install and warn the
server is called a server operating system. The firewall is installed on separate servers to manage
incoming and outgoing signals.
Interdependency of workstation:
Hardware and software, they are both very interdependent with each other. To output the computer,
they must work together. Without hardware support, the software can not be used, and if there is no
correct indication of the hardware provided, it is useless. To perform the work, a suitable software
package must be installed in the hardware. As various software, various tasks can be performed in the
hardware. Hardware and software are like the body and soul of a computer system. The software acts
as a connection between the user and, consequently, the hardware.
Conclusion:
Thus, I discussed various types of systems, such as peer-to-peer, client-server etc., as well as network
standards such as OSI model, TCP / IP model, etc., and their advantages and limitations. Also, I have
explained the different effects of network topologies, including the data rate and the connection
between them. I discussed the principles of operation of the mentioned network devices and server
types. And also, I discussed the hardware requirements, the servers with the appropriate software, their
interdependence and how they perform their work.
20
Dinisha Nath (HND / First Semester)
Networking 2019
Part 2
LO3 Design efficient networked systems.
This part of the assignment will contain the following based on the tasks in section 1 and section 2.
A LAN design plan and blueprint and justification document. A fully completed test plan
including an evaluation of results and recommendations for improvements to LAN. A proposed and
justified maintenance schedule. Evidence of an implemented network.
Introduction:
, I'm going to talk about the network system that is prepared by the Visio tool. A server is a type of
network that has organized network resources for other computer programs (and its users). Separation
of functions into two or several different parts of the application is known as server technology.
This means the domain controller. This is the server that leads to the desire for a security conformation
in the Windows server domain. It supports the approach to a set of network resources for a group of
users. In order for a domain to access sources, the user only needs to log on to the system.
21
Dinisha Nath (HND / First Semester)
Networking 2019
DHCP:
DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically
assign an Internet Protocol (IP) address to any device, or node, on a network so they can communicate
using IP. DHCP automates and centrally manages these configurations rather than requiring network
administrators to manually assign IP addresses to all network devices. DHCP can be implemented on
small local networks as well as large enterprise networks. (Rouse, n.d.)
CDC:
It is intended for the controller of the child domain. A child domain is another domain that falls under
the parent domain in the active directory domain in the hierarchy. This is similar to the first root of a
tree used for the boundaries of securities, with low network traffic and an administrative overhead.
RODC:
A read-only domain controller (RODC) is a server that hosts an Active Directory database's read-only
partitions and responds to security authentication requests. It is mainly used for backup of domain,
domain monitoring. Here system administrator can read only data but cannot change its security
policies.
22
Dinisha Nath (HND / First Semester)
Networking 2019
Firewall:
A network security system designed to secure a private network is called a firewall. It can be performed
as hardware and software, and a combination of both.
Organizational unit: A container for storing users, groups and computers is called an organizational
unit.
Testing of design :
The process of finding, analyzing and investigating any service, to complete, to find out whether it
works properly or not, is called testing. This helps to find out what error it is. Here we are going to
prepare a test log of what we tested, and what the expected result of this test magazine is.
Test log is given below:
3. Print server Custom computers must Customers have access The requirements have
be able to share a printer. to a shared printer. been fully met, as
clients gain access to
the printer
23
Dinisha Nath (HND / First Semester)
Networking 2019
4. Web server On the client computer, Web pages were seen on The requirements were
the web page on the the main server. fully met, as the web
primary server should be page was seen on the
displayed using the server.
primary site.
5. VPN server The client computer can The client computer was The requirements were
assign a VPN connection. able to assign VPN fully met.
connections
Evaluation of design:
Evaluation of design is also another important part to consider why it is suitable. Therefore, some of
the reasons are mentioned below that the network I built is suitable for organizations.
Reliability:
Reliability refers to the type of application, delivering packets from the source to the desired source.
Not only the level of communication, but also the components of network communication devices,
such as a firewall, routers, a switch, etc., must also be reliable. It is the function of any computer
component, such as hardware or network, or software that regularly executes in accordance with
requirements. Since I created a network for Nepal Bangladesh Bank Limited, taking into account all
the requirements of the organization.
Bandwidth:
Bandwidth is defined as a range within a band of frequencies or wavelengths. Bandwidth is also the
amount of data that can be transmitted in a fixed amount of time.For digital devices, the bandwidth is
usually expressed in bits per second(bps) or bytes per second. For analog devices, the bandwidth is
expressed in cycles per second, or Hertz (Hz).The bandwidth is particularly important for I/O devices.
In my network design, I used sufficient bandwidth to simultaneously transmit and receive more data.
Scalability:
Scalability is an attribute that describes the ability of a process, network, software or organization to
grow and manage increased demand. A system, business or software that is described as scalable has
an advantage because it is more adaptable to the changing needs or demands of its users or clients.
Scaling the network means creating a network design for the present and the future, and both. We do
not need to redesign the whole project in time, only small changes can be made at the request of the
organization, if the scaling was done at the beginning. In my project, I also scaled the network to
consider the changes that might arise in the future, and to adapt the possibilities of future preferences.
24
Dinisha Nath (HND / First Semester)
Networking 2019
Date:
Project Description: The project was built to establish a connection between the head office located in
Kathmandu and the branches of Nepal Bangladesh Bank Limited. This was possible only on
different servers as a DHCP server, a DC server, a RODC server, a CDC server, a VPN server, etc.
Project Limitation Despite its various advantages, it does not have a secondary DNS. This is
a small unpleasant difference or error when preparing a network design.
However, this can be fixed.
Feedback Evaluation
Feedback Evaluated Signature:
By: Dinisha Nath
Date:
25
Dinisha Nath (HND / First Semester)
Networking 2019
Evaluation of the system: The overall assessment of the system determines that the result is good,
while some restrictions also come, which can soon be met as soon as possible.
Recommendations for future consideration: The key factors that determine the network system
are scalability, which can be changed to meet the requirements of the organization. The prepared
network system should be timely updated, updated and analyzed by time to increase it in the future.
Lab Report:
A. Domain Controller (DC):
1. Introduction:
A domain controller (DC) is a server that responds to security authentication requests
within a Windows Server domain. It is a server on a Microsoft Windows or Windows NT network
that is responsible for allowing host access to Windows domain resources.
A domain controller is the centerpiece of the Windows Active Directory service. It authenticates
users, stores user account information and enforces security policy for a Windows domain.
26
Dinisha Nath (HND / First Semester)
Networking 2019
27
Dinisha Nath (HND / First Semester)
Networking 2019
28
Dinisha Nath (HND / First Semester)
Networking 2019
29
Dinisha Nath (HND / First Semester)
Networking 2019
30
Dinisha Nath (HND / First Semester)
Networking 2019
31
Dinisha Nath (HND / First Semester)
Networking 2019
32
Dinisha Nath (HND / First Semester)
Networking 2019
33
Dinisha Nath (HND / First Semester)
Networking 2019
4. Testing:
I. Open dsa.msc and
press ok.
34
Dinisha Nath (HND / First Semester)
Networking 2019
2. Prerequisites of DNS:
Active Directory Domain Services
DNS server services
35
Dinisha Nath (HND / First Semester)
Networking 2019
36
Dinisha Nath (HND / First Semester)
Networking 2019
37
Dinisha Nath (HND / First Semester)
Networking 2019
38
Dinisha Nath (HND / First Semester)
Networking 2019
XII. Finish.
39
Dinisha Nath (HND / First Semester)
Networking 2019
40
Dinisha Nath (HND / First Semester)
Networking 2019
41
Dinisha Nath (HND / First Semester)
Networking 2019
42
Dinisha Nath (HND / First Semester)
Networking 2019
5. Testing
43
Dinisha Nath (HND / First Semester)
Networking 2019
C. IIS Server
1. Introduction:
Internet Information Services (IIS) is a flexible, general-purpose web server. An IIS web
server accepts requests from remote client computers and returns the appropriate
response. This basic functionality allows web servers to share and deliver
information across local area networks, such as corporate intranets, and wide area
networks, such as the internet. It runs on the Microsoft .NET platform on the Windows OS.
It supports a variety of resources that let developers create applications to configure, manage,
and extend the functionality of IIS servers.
44
Dinisha Nath (HND / First Semester)
Networking 2019
45
Dinisha Nath (HND / First Semester)
Networking 2019
46
Dinisha Nath (HND / First Semester)
Networking 2019
47
Dinisha Nath (HND / First Semester)
Networking 2019
48
Dinisha Nath (HND / First Semester)
Networking 2019
49
Dinisha Nath (HND / First Semester)
Networking 2019
I. Testing
D. DHCP Server
I. Introduction::
DHCP stands for "Dynamic Host Configuration Protocol." DHCP is a protocol that
automatically assigns a unique IP address to each device that connects to a network. With
DHCP, there is no need to manually assign IP addresses to new devices. This is the network
management protocol used to dynamically assign an IP address on any device or node on the
network so that they can communicate using IP. DHCP automates and centrally manages
these configurations, and does not require that network administrators manually assign IP
addresses to all network devices.
50
Dinisha Nath (HND / First Semester)
Networking 2019
1. Open Server
Manager add roles
and features and
click on Next.
2. Select Role-based
and click Next.
51
Dinisha Nath (HND / First Semester)
Networking 2019
4. Enable option
DHCP server and
click on next for 3
times
continusously.
52
Dinisha Nath (HND / First Semester)
Networking 2019
5. Enable option
restart server if
required and install.
6. After installing
DHCP open Server
Manager>>Tools>
> DHCP.
53
Dinisha Nath (HND / First Semester)
Networking 2019
54
Dinisha Nath (HND / First Semester)
Networking 2019
55
Dinisha Nath (HND / First Semester)
Networking 2019
56
Dinisha Nath (HND / First Semester)
Networking 2019
15. Go to properties
and select IPV4
then double click it.
57
Dinisha Nath (HND / First Semester)
Networking 2019
58
Dinisha Nath (HND / First Semester)
Networking 2019
59
Dinisha Nath (HND / First Semester)
Networking 2019
60
Dinisha Nath (HND / First Semester)
Networking 2019
61
Dinisha Nath (HND / First Semester)
Networking 2019
26. Next.
62
Dinisha Nath (HND / First Semester)
Networking 2019
29. Install.
63
Dinisha Nath (HND / First Semester)
Networking 2019
64
Dinisha Nath (HND / First Semester)
Networking 2019
65
Dinisha Nath (HND / First Semester)
Networking 2019
66
Dinisha Nath (HND / First Semester)
Networking 2019
67
Dinisha Nath (HND / First Semester)
Networking 2019
68
Dinisha Nath (HND / First Semester)
Networking 2019
69
Dinisha Nath (HND / First Semester)
Networking 2019
70
Dinisha Nath (HND / First Semester)
Networking 2019
71
Dinisha Nath (HND / First Semester)
Networking 2019
72
Dinisha Nath (HND / First Semester)
Networking 2019
IV. Testing
73
Dinisha Nath (HND / First Semester)
Networking 2019
2. In Client OS is
receiving reply
from Server OS.
74
Dinisha Nath (HND / First Semester)
Networking 2019
4. Now in client OS
we see that it is
receiving IP of
200.200.200.2.
75
Dinisha Nath (HND / First Semester)
Networking 2019
E. Print Server
I. Introduction:
A print server is a device that connects printers to client computers over a network. It accepts print
jobs from the computers and sends the jobs to the appropriate printers, queuing the jobs locally to
accommodate the fact that work may arrive more quickly than the printer can actually handle. Print
servers are connected to a computer network in order to serve the need for printing jobs in a network
that may contain more than one printer.
1. Go to the server
manager then click on
Manage select Add
Roles and Features then
next.
76
Dinisha Nath (HND / First Semester)
Networking 2019
2. Next.
77
Dinisha Nath (HND / First Semester)
Networking 2019
5. Install.
78
Dinisha Nath (HND / First Semester)
Networking 2019
9. Now select
Manufacturer and
Printers then Next.
79
Dinisha Nath (HND / First Semester)
Networking 2019
11. Finish.
Then install Client OS
and create the network
between both Server OS
and Client OS through
DHCP.
80
Dinisha Nath (HND / First Semester)
Networking 2019
IV. Testing
81
Dinisha Nath (HND / First Semester)
Networking 2019
F. VPN Server
I. Introduction
A Virtual Private Network (VPN) is a network technology which extends private network over a public
network such as Internet. A VPN allows a computer to be connected securely as if they are physically
wired together. Corporations use VPN to allow remote workers to connect securely to their private
network. It is mainly used for security purposes and it is used by ISP, Telecom, Bank, UN etc. IPsec
primarily utilizes tunnel mode for creating VPN tunnels.
1. Go to Server Manager
then select Add Roles
and Features then Next.
82
Dinisha Nath (HND / First Semester)
Networking 2019
2. Next.
4. Select the
option
Remote
access
and click om next
83
Dinisha Nath (HND / First Semester)
Networking 2019
5. Click on next.
84
Dinisha Nath (HND / First Semester)
Networking 2019
8. After installation
succeeds. Open
server manager go
to tools and select
the option remote
access
management
85
Dinisha Nath (HND / First Semester)
Networking 2019
86
Dinisha Nath (HND / First Semester)
Networking 2019
87
Dinisha Nath (HND / First Semester)
Networking 2019
88
Dinisha Nath (HND / First Semester)
Networking 2019
89
Dinisha Nath (HND / First Semester)
Networking 2019
Ethernet1 and
click on next.
90
Dinisha Nath (HND / First Semester)
Networking 2019
91
Dinisha Nath (HND / First Semester)
Networking 2019
20. Click on
the
option
Networking
and sharing
center.
92
Dinisha Nath (HND / First Semester)
Networking 2019
93
Dinisha Nath (HND / First Semester)
Networking 2019
94
Dinisha Nath (HND / First Semester)
Networking 2019
95
Dinisha Nath (HND / First Semester)
Networking 2019
IV. Testing
1. Click on connect>>
Provide Username
and password>>Ok.
G. RODC
I. Introduction:
A read-only domain controller (RODC), It is mainly used for backup of domain, domain
monitoring. Here system administrator can read only data but cannot change its security
policies. It is a helping assistance domain and it is used in branch offices. RODC is like
clone of a
Primary Domain Controller. Here data is replicated. When we create the user in Primary
Domain Controller the user is replicated into Read Only Domain Controller. But we
cannot create or delete the user from Read Only Domain Controller. It just reads the data.
96
Dinisha Nath (HND / First Semester)
Networking 2019
97
Dinisha Nath (HND / First Semester)
Networking 2019
3. Next.
98
Dinisha Nath (HND / First Semester)
Networking 2019
5. Install.
99
Dinisha Nath (HND / First Semester)
Networking 2019
7. VM>>Settings.
100
Dinisha Nath (HND / First Semester)
Networking 2019
9. In Server OS 1 assign
preferred DNS address
of Server OS then ok
and close.
101
Dinisha Nath (HND / First Semester)
Networking 2019
102
Dinisha Nath (HND / First Semester)
Networking 2019
103
Dinisha Nath (HND / First Semester)
Networking 2019
104
Dinisha Nath (HND / First Semester)
Networking 2019
H. Testing
1. It is the Server OS 2
and I had created user
rajesh in Server OS 1
and here it is replicated.
105
Dinisha Nath (HND / First Semester)
Networking 2019
H. CDC
I. Introduction
CDC stands for Child Domain Controller which is also a helping domain of Primary
Domain Controller as that of RODC. It helps to reduce the data loads in PDC. Like that of
in RODC, Data will not be replicated in Child Domain. Here CDC updates the information
to PDC and PDC will monitor it. CDC is used by a large organization. Child domains are
used to accomplish network management goals, such as structuring the network, removing
problems of a network.
106
Dinisha Nath (HND / First Semester)
Networking 2019
107
Dinisha Nath (HND / First Semester)
Networking 2019
3. Provide a
strong
password.
108
Dinisha Nath (HND / First Semester)
Networking 2019
4. Click Next
5. Check your
NetBIOS domain
name and click on
next.
109
Dinisha Nath (HND / First Semester)
Networking 2019
6. Next>>
After successfully
checking
prerequisites, click
on install
110
Dinisha Nath (HND / First Semester)
Networking 2019
IV. Testing
2. In My Computer
Properties We can
see our CDC.
111
Dinisha Nath (HND / First Semester)
Networking 2019
I. WDS
I. Introduction
Windows Deployment Services is a server role that gives administrators the ability to
deploy Windows operating systems remotely. It is mostly used by large scale
organizations. It enables remote installation of Windows over the network. Windows
Deployment Services is used for remotely deploying the Windows like Windows10,
Windows8, 7, Windows XP etc.
• ADDS
• DHCP
• PXE bootable LAN Card
• ISO Image file
112
Dinisha Nath (HND / First Semester)
Networking 2019
roles and
5. Next>>Next>>
Select both options and
click on next
113
Dinisha Nath (HND / First Semester)
Networking 2019
114
Dinisha Nath (HND / First Semester)
Networking 2019
9. Click on Next
option
115
Dinisha Nath (HND / First Semester)
Networking 2019
116
Dinisha Nath (HND / First Semester)
Networking 2019
117
Dinisha Nath (HND / First Semester)
Networking 2019
118
Dinisha Nath (HND / First Semester)
Networking 2019
17. Next>>Next.
119
Dinisha Nath (HND / First Semester)
Networking 2019
120
Dinisha Nath (HND / First Semester)
Networking 2019
IV. Testing
i. The target computer must provide the answer The target computer provides a specific
after the ping. answer.
121
Dinisha Nath (HND / First Semester)
Networking 2019
Analysis:
Each ping makes 4 attempts and provides a response for each attempt. In the above test, too much
response was received, which indicates that the connection test was successful.
ii. We should see name of domain we created in the user The server displays the name of the
and group formation. created domain.
122
Dinisha Nath (HND / First Semester)
Networking 2019
Analysis:
When we restarted the server domain name was tested.
Analysis:
The printer accesses all the members of the client.
Print server:
What was tested: Print server Date: 10/11/2018
vi. All the clients must be able to use the printer. The client computers access the printer.
123
Dinisha Nath (HND / First Semester)
Networking 2019
Analysis:
The printer accesses all the members of the client.
VPN test:
What was tested: VPN Date: 10/11/2018
vii. The answer should be obtained after the ping when you connect The answer was received
to a private Network after ping.
124
Dinisha Nath (HND / First Semester)
Networking 2019
Analysis:
The answer was received after ping, which means on the same network, which means that the VPN
has been tested.
Conclusion:
In the above task, I completed the analytical report against the expected result, given the number of
the test log test, those that were tested, the expected result and the actual result.
125
Dinisha Nath (HND / First Semester)