In Perth there is a company and its name was “Groovy Movie”. They do business in entertainment field. They rents out the CD or DVD that contains the movies or popular TV shows. As like all company they also have various subdivisions. They are Consumer services, Finance, and Inventory. The overall strength of the company was 50 members. The CEO of the company decided to implement the LAN for enriching their potential. Because that improves the effectiveness of communication as well as data sharing among the various departments. For this purpose they need a no of domain systems based on the Windows server-OS. Here we would see about the implementation of LAN.
2. Development of the LAN
The LAN that must have the mobility. Because that is the very important requirement of the company. The system must be cost effective. The LAN system that must contains the effective information sharing technologies. The security was also very essential in the required LAN. So the LAN design was created by these considerations [1].
In LAN there are two most common technologies are followed. Each has its own advantages as well as dis advantage. They are Wired LAN and Wireless LAN. Wired LAN was most widely used for so far. Wired LAN system uses the RJ-45 fiber cable for the data sharing purpose. So this kind of network was called as RJ-45 Network system. For our requirement the most suited technology was wired LAN. That would be demonstrated in the clients company.
3. Requirement Planning.
The main part of the network design involves the selection of appropriate hardware. Because that verify the success of the plan. For our design need we need to select the best suited hardware. Ethernet adapters was the first and foremost need for the network development. After that we need switches for connecting systems. That acts likes a bridge between the computers. That is responsible for sharing the data between the computers. And also the RJ-45 cables are required for the system development [2] [3].
4. Authentication techniques
Active Directory Domain Services (ADDS) is used for user authentication. One main domain is setup with the help of one Windows server 2016 based domain controller. The main domain (Parent domain name) selected is groovimovies.com. Users are in a child domain called users.groovimovies.om. Child domain is setup with the help of one Windows server 2016 based domain controller. One client machine is setup and client OS is installed. This client machine represents the end users computer [2].
OS structure is used to separate each department users. Three Ous will be setup. i.e : Inventory, Finance and Customer Service. Users of the same department will be added in their respective OUs.
Parent-Child trust will be implicitely established. It is a two way transitive trust.
5. DHCP configuration
One Windows Server 2016 based server will be selected as a DHCP server. Except main domain controller other servers and end users will get IPs from the DHCP Server.
Following configuration can be used
Main Domain Controller : 192.168.1.1 / 24 ( Static IP)
DNS Server : 192.168.1.2 / 24 (Static IP)
DHCP Server : 192.168.1.3 / 24 (Static IP)
Scope-1 : 192.168.1.10 / 24 to 192.168.1.100 / 24
Scope-1 IPs will be automaticaly used by child domain controller and all other domain computers.
Here the step by step process of DHCP configuration was showed below. The below showed screen shots allow higher understanding of the concepts.
6. IIS server in LAN
One Windows Server 2016 based server will be selected as a web server and IIS server will be installed. Groovimovies.com domain can be used in the internet. The home directory files for this website will be stored in the webserver. Usually the webservers will be kept in De-Militarized zone. One firewall will be introduced between outside network and inside network. Then web server will be connected in the DMZ zone. All the public facing servers will be in the DMZ zone [4] [5][6].
7. ADMINSTRATOR DOMAIN
Groovimovies.com is the administrative domain. It is the parent domain. That was controlled by the domain controller.
Administration domain system was responsible for the overall control of the network systems. That decides the action of the entire network system control. So this is the authority for the client users in the network. They were controlled by the administration system.
That is called as admin-territory. That is responsible for the entire control system of the network. That have the capability to control the entire system. In the network head assignment was done by the realm controller. By this system the administrator or the controller of the network can perform the operations like insert, modifications, etc. In the organizer zone that gives the static permissions.
Client domains are just follow the instruction given by the administrator. In these system some devices are employed to do this activity. So it carries the power to control the no of systems under its control. That enables the standard structure in the network.
Configure of server access points,
For establish the network we need to do the below stated steps, and they are listed below.
Provide IP for the devices in the network systems
Implement the NAT
Implement the firewall
Here the process of configuring the administrator was showed below.
8. Functional Needs
They are necessary needs of the system. That is responsible for the overall function of the system. They have the higher amount of preferences because the actual performance of the system was depends on this needs. For the network design some are the main parameters are discussed below. And they are connecting wires, Computers, and Switches. Among these needs the switch was considered as the main need. Because the entire system needs this think for the successful operation of the system [7].
Switches
They are used in the network system to establish the connection among the computers. In the typical LAN system consists hub for the same action. But that has some major drawbacks. So we use the switches. They are the active element of the system. We can’t assume the network system without the switch [8].
9. Non-functional requirements
Nonfunctional needs are also required needs of the network system. They doesn’t participate actively on the system. But it enhances the actual quality of the system. So that are called as quality needs [8] [9] [10]. Developed design of the LAN was showed below,
Screenshots
10. Conclusion
The network design was developed to the need of project with the Visio software. In this creation the local area network completed by the usage of software such as netsim and Visio. In the local area network it had two domain such as administrator and another one is for people who have the access. For that domain it need the authentication. In that dynamic host configuration protocol is used to design the local area network and it is used to provide IP dynamically and for the host configuration is done by ISS server and from the scenario it has three departments like customer finance and inventory and in that working employees count as 50. And it works as organizational unit. By the way the administrator is used to provide the data about company and it is used for the second domains for the vision.
References
[1]D. Verma, “Simplifying network administration using policy-based management”, IEEE Network, vol. 16, no. 2, pp. 20-26, 2002.
[2]V. Sto?ka, “DEVELOPMENT OF LINUX-BASED NETWORK ADMINISTRATION AND CONTROL SYSTEM”, Environment. Technology. Resources. Proceedings of the International Scientific and Practical Conference, vol. 1, p. 284, 2001.
[3]K. Athota and A. Negi, “A topology preserving cluster-based channel assignment for wireless mesh networks”, International Journal of Communication Systems, vol. 28, no. 12, pp. 1862-1883, 2014.
[4]S. Islam and M. Amanul Islam, “SysProp: A Web-based Data Backup, Synchronization and System Administration”, International Journal of Computer Network and Information Security, vol. 6, no. 9, pp. 1-11, 2014.
[5]Y. YIN, Z. LIU and L. XU, “Cache System Based on Disk Media for Network Storage”, Journal of Software, vol. 20, no. 10, pp. 2752-2765, 2009.
[6]Z. Rao and T. Pu, “Decision Diagram-Based Modeling of Network Reachability”, Applied Mechanics and Materials, vol. 513-517, pp. 1779-1782, 2014.
[7]A. Yengui and M. Neji, “Ontology-based System for Semantic Visio-conference Information Retrieval and Annotation”, Communications of the IBIMA, pp. 1-10, 2011.
[8]J. SIDERA CASAS, “Visio artis, Simbolismo, Analogía y Ontología en el Arte de Ramon Llull / Visio artis, Symbolism, Analogy and Ontology in the Art of Ramon Llull”, Revista Española de Filosofía Medieval, vol. 22, p. 11, 2015.
[9]R. Geist and K. Trivedi, “Queueing Network Models in Computer System Design”, Mathematics Magazine, vol. 55, no. 2, p. 67, 1982.
[10]X. Wei, “Design and Implementation of Network Management System Based on Mixed-mode”, Physics Procedia, vol. 24, pp. 871-876, 2012.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download