Network infrastructure MANAGEMENT OF j&k BANK

Embed Size (px)

Citation preview

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    1/94

    Network

    infrastructure

    MANAGEMENT OF

    j&k BANK

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    2/94

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    3/94

    CONTENTS AT GLANCE

    1. Introduction2. Project Layout3. Hardware & Software Requirements4. Installation of server 2003 standard edition5. Installation of Active Directory6. Installation of DNS & configuring it7. Installation of Additional domain server8. Configuration of client computers9. Creation of users10.Applying permission on users via organizational unit11.Installation of IIS service12.Installation of FTP server13.Router configuration

    (a)Configuration of Srinagar router(b)Configuration of Budgam router(c)Configuration of Baramulla router(d)Configuration of Anantnag router(e)Configuration of Jammu router

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    4/94

    PROJECT LAYOUT

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    5/94

    INTRODUCTION

    Our project is WAN infrastructure management or simply Networking of J&K

    Bank. J&K Bank is one of the prominent financial Institution of Jammu & Kashmir

    having branches all over India. J&K bank Headquarter is connected to its branches& other important financial institutions for smooth functioning & convenience

    clients.

    Why networking in Banks ?

    It is not just that use networks. A lot of business do . However one example of

    why a bank uses networks is, say you go & open account. For you to be able

    withdraw money from a different town/city, that would mean (without

    networks) somebody is going to have to call every bank & give your details & then

    every time you lodge or take out money they have to call all the banks again to

    keep them up-to- date on your account.

    With networks,every bank can see your account ,what is in your account and it

    saves having to get somebody call other banks every time you make a

    withdrawal.

    Computerization has revolutionized the banking industry. The advent of the usage

    of computers has enormously increased the banking capabilities of the banks and

    they are able to offer better and wider range of services to their customers.

    Internet banking, mobile banking, ATMs etc are all the fruits of computerization

    of the banking industry. Banks are able to expand at a great rate and offer

    services to more and more customers because of the use of computers .

    We have installed two servers in the headquarter of J&K Bank,one acts as parent

    domain (jkbank) and other one as additional domain (nim.jkbank), restrictions

    have been applied on the users . Besides, FTP and Web server have been installed

    . Each router is connected via internet to the headquarter.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    6/94

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    7/94

    NETWORKING

    Network:

    A group or a collection of two or more computers, printers, routers, switches,

    systems linked together so that they are able to communicate with each other

    using some transmission media such as wires, cables, fibre,etc.

    Types of Networks

    There are Four basic types of networks currently in existence

    1.Local Area Network (LAN)

    2.Wide Area Network (WAN)

    3.Metropolitan-area Network (MAN)

    4.Home-area Network (HAN)

    Local Area Networks (LAN)

    A Local Area Network(LAN) is a group of computers and network communication

    devices within a limited geographic area, such as an office building. No third party

    involvement here.

    They are characterized by the following:

    High data transfer speeds

    Generally less expensive technologies

    Limited geographic area

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    8/94

    Wide Area Networks (WAN)

    A Wide Area Network(WAN) interconnects LANs. It is not restricted to a

    particular geographic area and may be interconnected around the world. Third

    party network is involved.

    They are characterized by the following:

    Multiple interconnected LANs

    Generally more expensive technology

    More sophisticated to implement than LANs

    Exist in an unlimited geographic area

    Less error resistance due to transmission travel distances

    Metropolitan-area Network (MAN)

    A MAN is a network that connects LANs and/or buildings in an area that is often

    larger than a campus. For example, a MAN might be used to connect a companys

    various offices within a metropolitan area via the services of a telecom provider.

    Home Area Networks (HAN)

    A HAN is a network contained within a user's home that connects a person's

    digital devices, from multiple computers and their peripheral devices to

    telephones, VCRs, televisions, video games, home security systems, "smart"

    appliances, fax machines and other digital devices that are wired into the

    network.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    9/94

    Networking devices

    There are numerous devices associated with data information flow

    across a network. When adjoined, they create the infrastructure of a

    functional network. These devices include:

    Repeaters

    Bridges

    Hubs

    Switches

    Routers

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    10/94

    Repeaters

    Repeaters, located within the physical layer of a network, regenerate and

    propagate signals from one to another. They do not change any information being

    transmitted, and they cannot filter any information. Repeaters help to extend thedistances of networks by boosting weak signals.

    Bridges

    Bridges are intelligent repeaters. They regenerate transmitted signals, but unlike

    repeaters, they can also determine destinations.

    Hubs

    Hubs connect all computer LAN connections into one device. They are nothing

    more than multiport repeaters. Hubs cannot determine destinations; they merely

    transmit to every line attached in a half-duplex mode.

    Routers

    Routers are a step up from bridges. They are able to route and filter information

    to different networks. Some routers can automatically detect problems and

    redirect information around the problem area. These are called "intelligent

    routers."

    Switches

    Switches connect all computer LAN connections, the same as hubs do. The

    difference is that switches can run in full-duplex mode and are able to direct and

    filter information to and from specific destinations

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    11/94

    NETWORK TOPOLOGIES

    The Topology refers to a map of the network ( logical or physical )The

    physical topology of a network refers to the configuration of cables,

    computers, information between workstations.The following are

    physical topologies used in networks.

    Linear Bus

    Star

    Star-Wired Ring

    TreeLinear Bus Architecture

    In a Linear bus topology a single cable connects each workstation in a

    linear, daisy-chained fashion. Signals are broadcasted to all stations, but

    stations only act on the frames addressed to them.

    Advantages of a Linear Bus Topology

    * Easy to connect a computer or peripheral to a linear bus.

    * Requires less cable length than a star topology.

    Disadvantages of a Linear Bus Topology

    * Entire network shuts down if there is a break in the main cable.

    * Terminators are required at both ends of the backbone cable.

    * Difficult to identify the problem if the entire network shuts down.

    * Not meant to be used as a stand-alone solution in a large building.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    12/94

    Star topology

    In a star topology, each station is connected to a central hub or concentrator that

    functions as a multi-port repeater. Each station broadcasts to all of the devices

    connected to the hub. Physical LAN topologies are usually characterized as either

    bus or ring. The protocols used with star configurations are usually Ethernet or

    Local Talk. Token Ring uses a similar topology, called the star-wired ring.

    Advantages of a Star Topology

    Easy to install and wire.

    No disruptions to the network then connecting or removing devices.

    Easy to detect faults and to remove the failed nodes or broken cables.

    Disadvantages of a Star Topology

    Requires more cable length than a linear topology.

    If the hub or concentrator fails, nodes attached are disabled.

    More expensive than linear bus topologies because of the cost of the

    concentrators.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    13/94

    Ring Architecture

    In a ring topology unidirectional links connect the transmit side of one device to

    the receive side of another device.Devices transmit frames to the next device

    (downstream member) in the ring.

    Star-Wired Ring

    A star-wired ring topology may appear (externally) to be the same as a star

    topology. Internally, the MAU (multistation access unit) of a star-wired ring

    contains wiring that allows information to pass from one device to another in a

    circle or ring. The Token Ring protocol uses a star-wired ring topology.

    Tree Topology

    A tree topology combines characteristics of linear bus and star topologies. It

    consists of groups of star-configured workstations connected to a linear busbackbone cable (See fig). Tree topologies allow for the expansion of an existing

    network, and enable schools to configure a network to meet their needs

    Advantages of a Tree Topology

    Point-to-point wiring for individual segments.

    Supported by several hardware and software venders.

    Disadvantages of a Tree Topology

    Overall length of each segment is limited by the type of cabling used.

    If the backbone line breaks, the entire segment goes down.

    More difficult to configure and wire than other topologies

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    14/94

    Logical topologies

    Logical topologies are of two types:

    1.Workgroup

    2.domain

    Workgroup

    A workgroup is a logical group of computers which is characterized by a

    decentralized security and and administration model. Authentication provided by

    a local account database Security Accounts Manager (SAM) A simple grouping of

    computers, intended only to help users find such things as printers and shared

    folders within that group. Workgroups in Windows do not offer the centralized

    user accounts and authentication offered by domains.

    Limitations

    Users need unique accounts on each workstation

    Users manage their own accounts (security issues)

    Not very scalable

    Domain

    A domain is a logical group of computers which is characterized by centralized

    authentication and administration Authentication provided through centralized

    Active Directory Active Directory database can be physically distributed across

    domain controllers.Requires at least one system configured as a domain

    controller

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    15/94

    IP ADDRESSING & SUBNETTING

    There are two versions of IPs

    1.IP version 4:offers upto 4.2 billion 32-bit size)

    2.IP version 6:128-bit size

    Each IP address includes the source IP address and destination IP address that

    identifies the source and destination network and host.

    When IP was first developed, there were no classes of addresses. Now, for ease of

    administration, the IP addresses are broken up into classes.

    The bits in the first octet identify the address class. The router uses the first bits

    to identify how many bits it must match to interpret the network portion of the

    address

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    16/94

    Class A addresses include the following:

    The first bit is 0.

    Range of network numbers: 1.0.0.0 to 126.0.0.0

    Number of possible networks: 127 (1- 126 usable, 127 is reserved)

    Number of possible values in the host portion: 16,777,216.

    Class B addresses include the following:

    The first two bits are 10.

    Range of network numbers: 128.0.0.0 to 191.255.0.0

    Number of possible networks: 16,384

    Number of possible values in the host portion: 65,536

    Class Caddresses include the following:

    The first three bits are 110.

    Range of network numbers: 192.0.0.0 to 223.255.255.0

    Number of possible networks: 2,097,152

    Number of possible values in the host portion: 256

    Class D addresses include the following:

    Range of network numbers: 224.0.0.0 to 239.255.255.255

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    17/94

    Subnetting:

    Subnetting an IP network is to separate a big network into smaller multiple

    networks for reorganization and security purposes. All nodes (hosts) in a

    subnetwork see all packets transmitted by any node in a network.

    Performance of a network is adversely affected under heavy traffic load

    due to collisions and retransmissions.

    Subnetting is also called as FLSM (Fixed Length Subnet Mask)

    Subnetting can be done in three ways.

    Requirement of Networks

    Requirement of Hosts

    Cisco / Notation

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    18/94

    Subnet Mask Examples

    Class A : N.H.H.H

    11111111.00000000.00000000.00000000

    Default Subnet Mask for Class A is 255.0.0.0

    Class B : N.N.H.H

    11111111.11111111.00000000.00000000

    Default Subnet Mask for Class B is 255.255.0.0

    Class C : N.N.N.H

    11111111.11111111.11111111.00000000

    Default Subnet Mask for Class C is 255.255.255.0

    How subnet mask works:

    IP Address : 192.168.1.1

    Subnet Mask : 255.255.255.0

    ANDING PROCESS :

    192.168.1.1 = 11000000.10101000.00000001.00000001

    255.255.255.0 = 11111111.11111111.11111111.00000000

    =======================================

    192.168.1.0 = 11000000.10101000.00000001.00000000

    =======================================

    The output of an AND table is 1 if both its inputs are 1.

    For all other possible inputs the output is 0.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    19/94

    Main Aim of Subnetting

    Problem with the previous Scenario is :-

    Loss of bandwidth as the broadcasting is done for 254 machines rather than

    for 20 machines.

    Wastage of IP addresses (Approximately 1000)

    No Security

    ETHERNET CABLE

    We can find bulk supplies of ethernet cable at many computer stores or

    most electrical or home centers. You want UTP (Unshielded Twisted Pair)ethernet cable of at least Category 5 (Cat 5). Cat 5 is required for basic10/100 functionality, you will want Cat 5e for gigabit (1000BaseT) operationand Cat 6 or higher gives you a measure of future proofing. You can alsouse STP (Shielded Twisted Pair) for extra resistance to externalinterference but I won't cover shielded connectors. Bulk ethernet cablecomes in many types, there are 2 basic categories, solid and braidedstranded cable. Stranded ethernet cable tends to work better in patchapplications for desktop use. It is more flexible and resilient than solidethernet cable and easier to work with, but really meant for shorter lengths.

    Solid ethernet cable is meant for longer runs in a fixed position. Plenumrated ethernet cable must be used whenever the cable travels through anair circulation space. For example, above a false ceiling or below a raisedfloor. It may be difficult or impossible to tell from the package or labellingwhat type of ethernet cable it is, so peal out an end and investigate.

    Here is what the internals of the ethernet cable look like:

    Internal Cable Structure and Color Coding

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    20/94

    Inside the ethernet cable, there are 8 color coded wires. These wires aretwisted into 4 pairs of wires, each pair has a common color theme. Onewire in the pair being a solid or primarily solid colored wire and the otherbeing a primarily white wire with a colored stripe (Sometimes ethernetcables won't have any color on the striped wire, the only way to tell which iswhich is to check which wire it is twisted around). Examples of the namingschemes used are: Orange (alternatively Orange/White) for the solidcolored wire and White/Orange for the striped cable. The twists areextremely important. They are there to counteract noise and interference. Itis important to wire according to a standard to get proper performance fromthe ethernet cable. The TIA/EIA-568-A specifies two wiring standards for an8-position modular connector such as RJ45. The two wiring standards,T568A and T568B vary only in the arrangement of the colored pairs. Tomwrites to say "...sources suggest using T568A cabling since T568B is the

    AT&T standard, but the US Government specifies T568A since it matchesUSOC cabling for pairs 1 & 2, which allows it to work for 1/2 line phones...".Your choice might be determined by the need to match existing wiring,

    jacks or personal preference, but you should maintain consistency. I'veshown both below for straight through cabling and just T568B for crossovercabling

    T-568A Straight-Through Ethernet Cable

    The TIA/EIA 568-A standard which was ratified in 1995, was replaced by the

    TIA/EIA 568-B standard in 2002 and has been updated since. Both standards

    define the T-568A and T-568B pin-outs for using Unshielded Twisted Pair cable

    and RJ-45 connectors for Ethernet connectivity. The standards and pin-out

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    21/94

    specification appear to be related and interchangeable, but are not the same and

    should not be used interchangeably.

    T-568B Straight-Through Ethernet Cable

    Both the T-568A and the T-568B standard Straight-Through cables are used most

    often as patch cords for your Ethernet connections. If you require a cable to

    connect two Ethernet devices directly together without a hub or when you

    connect two hubs together, you will need to use a Crossover cable instead.

    RJ-45 Crossover Ethernet Cable

    A good way of remembering how to wire a Crossover Ethernet cable is to wire one

    end using the T-568A standard and the other end using the T-568B standard.

    Another way of remembering the color coding is to simply switch the Green set of

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    22/94

    wires in place with the Orange set of wires. Specifically, switch the solid Green(G) with the solid Orange, and switch the green/white with the orange/white.

    Basic Theory:

    By looking at a T-568A UTP Ethernet straight-thru cable and an Ethernetcrossover cable with a T-568B end, we see that the TX (transmitter) pins

    are connected to the corresponding RX (receiver) pins, plus to plus and

    minus to minus. You can also see that both the blue and brown wire pairs

    on pins 4, 5, 7, and 8 are not used in either standard. What you may not

    realize is that, these same pins 4, 5, 7, and 8 are not used or required in

    100BASE-TX as well. So why bother using these wires, well for one thing

    its simply easier to make a connection with all the wires grouped together.

    Otherwise you'll be spending time trying to fit those tiny little wires into

    each of the corresponding holes in the RJ-45 connector.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    23/94

    INSTALLATION OF WINDOWS SERVER 2003

    1-Start the computer from the CD.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    24/94

    2- You can press F6 if you need to install additional SCSI adapters or other mass-

    storage devices. If you do you will be asked to supply a floppy disk with the

    drivers and you CANNOT browse it (or a CD for that matter). Make sure you have

    one handy.

    3- Setup will load all the needed files and drivers

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    25/94

    4- Select or create the partition on which you will install Windows Server 2003.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    26/94

    5- Select a file system for the installation partition. After you create the partition

    on which you will install Windows Server 2003, you can use Setup to select the file

    system with which to format the partition. Windows Server 2003 supports the

    NTFS file system in addition to the file allocation table (FAT) and FAT32 file

    systems.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    27/94

    6- Setup will then begin copying necessary files from the installation point (CD,

    local I386 or network share).

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    28/94

    7- The computer will restart in graphical mode, and the installation will continue

    8- Now the setup process reboots and loads a GUI mode phase

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    29/94

    INSTALLATION OF ACTIVE DIRECTORY

    1-Click Start, Point to run & type dcpromo

    2- The wizard windows will appear. Click Next

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    30/94

    3-In the Operating System Compatibility windows read the requirements for the

    domain's clients and if you like what you see - press Next

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    31/94

    4- Choose Domain Controller for a new domain and click Next

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    32/94

    5- Choose Create a new Domain in a new forest and click Next

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    33/94

    6-Enter the full DNS name of the new domain ,this must be the same as the DNS

    zone .click next

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    34/94

    7-Accept the down level Net BIOS domain name,click next

    8- Accept the Database and Log file location dialog box (unless you want to

    change them of course). The location of the files is by default

    %systemroot%\NTDS, and you should not change it unless you have performance

    issues in mind. Click Next.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    35/94

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    36/94

    10- Click next

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    37/94

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    38/94

    14-Review settins and click next

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    39/94

    16-On see the final conformation window click finish.

    17- Click Restart now.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    40/94

    INSTALLATION OF DNS & CONFIGURING IT

    Installation of DNS

    1- Open Windows Components Wizard. To do so, use the following steps:

    2- 2- Click Start, click Control Panel, and then click Add or Remove Programs

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    41/94

    3- Click Add/Remove Windows Components

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    42/94

    4- In Components, select the Networking Services check box, and then click

    Details.

    5- Now click on Next.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    43/94

    6- In Subcomponents of Networking Services, select the Domain Name System

    (DNS) check box, click OK, and then click Next.

    7- If you are prompted, in Copy files from, type the full path of the distribution

    files, and then click OK.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    44/94

    8- Insert windows 2003 cd in to CD-ROM and select the desire file.

    9- Now click on finish.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    45/94

    Configuration of DNS

    1- click on start and go to All Programs.

    2- Now go to Administrative Tools and click on DNS

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    46/94

    3- In the DNS wizard, click on plus sign of server name.

    4- Now Right click on Forward Lookup zone.

    5- Click on New Zone

    6- Click on Next on welcome to the New Zone wizard

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    47/94

    7- Click radio button on Primary Zone

    8- Click on Next

    9- Now give the name of Zone, jkbank

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    48/94

    10- Now click on Next

    11- Now again click on Next.

    12- click on finish

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    49/94

    INSTALLATION OF ADDITIONAL DOMAIN (ADC)

    Additional Domain controller is the domain which provide the fault tolerance.If

    you already have one domain controller in a domain, you can add additional

    domain controllers to the domain to improve the availability and reliability ofnetwork services. Adding additional domain controllers can help provide fault

    tolerance, balance the load of existing domain controllers, and provide additional

    infrastructure support to sites. More than one domain controller in a domain

    makes it possible for the domain to continue to function if a domain controller

    fails or must be disconnected.

    Steps of installation of ADC

    1- Click Start, point to Run and type "dcpromo".

    2- The wizard windows will appear. Click Next.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    50/94

    3- In the Operating System Compatibility window click Next.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    51/94

    4- Choose Additional Domain Controller for an existing domain and click Next

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    52/94

    6- In the Network Credentials window enter the username and password for a

    Domain Admin in the domain you're trying to join. also enter the full DNS domain

    name. Click Next.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    53/94

    7- Accept the Database and Log file location dialog box (unless you want to

    change them of course). The location of the files is by default

    %systemroot%\NTDS, and you should not change it unless you have performance

    issues in mind. Click Next.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    54/94

    8- Accept the Sysvol folder location dialog box (unless you want to change it of

    course). The location of the files is by default %systemroot%\SYSVOL, and you

    should not change it unless you have performance issues in mind. This folder

    must be on an NTFS v5.0 partition. This folder will hold all the GPO and scripts

    you'll create, and will be replicated to all other Domain Controllers. Click Next.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    55/94

    9- Enter the Restore Mode administrator's password. Whatever you do -

    remember it! Without it you'll have a hard time restoring the AD if you ever need

    to do so. Click Next.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    56/94

    10- Review your settings and if you like what you see - Click Next

    11- See the wizard going through the various stages of installing AD. Whatever

    you do - NEVER click Cancel!!! You'll wreck your computer if you do. If you seeyou made a mistake and want to undo it, you'd better let the wizard finish and

    then run it again to undo the AD.

    12- If all went well you'll see the final confirmation window. Click Finish.

    13- You must reboot in order for the AD to function properly. Click Restart now.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    57/94

    Configuration of client computer:

    1- Log on Through Administrator.

    2- Open properties of My Network Place and Local area Connection.

    3- Now configure the IP address, subnet mask and DNS address.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    58/94

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    59/94

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    60/94

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    61/94

    Creation of users:

    1.Open Active Directory by type the dsa.msc command at Run menu

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    62/94

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    63/94

    Applying permissions on user through organizational unit:

    Group Policy is an infrastructure that allows you to implement specific

    configurations for users and computers. Group Policy settings are contained in

    Group Policy objects (GPOs), which are linked to the following Active Directory

    directory service containers: sites, domains, or organizational units (OUs). The

    settings within GPOs are then evaluated by the affected targets, using the

    hierarchical nature of Active Directory

    With the help of group policy we can do following:

    Control the user environment.

    - Manipulate Start menu options, wallpaper, colors, and so on.

    - Prevent users from using Control Panel.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    64/94

    Control the computer settings.

    - Configure DNS client settings.

    - Configure the time server client computers use.

    Distribute software.

    - Force software installation.

    - Allow for easy optional software installation through Add/Remove

    Programs.

    POLICY SETTINGS

    Policy settings via organizational unit can be of following types:

    Registry-based

    Software installations and repairs

    Folder redirection and offline storage

    Disk quotas

    Internet Explorer configuration

    BENEFITS OF GROUP POLICY SETTINGS

    User benefits

    - Access to files either offline or online.

    - Consistent environment.

    - Files are centrally backed up.

    Administrator benefits

    - Centralized management of computer and user settings.

    - Centralized application distribution.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    65/94

    - Centralized backup.

    - Centralized security enforcement.

    Steps of creating organizational unit:

    1- Open Active Directory, right click on Domain Server.

    2- Click on New, and Click on Organizational Unit.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    66/94

    Assigning policies to users:

    1- Open Active Directory.

    2- Right Click on OU and click on Properties

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    67/94

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    68/94

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    69/94

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    70/94

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    71/94

    5- Now select the Internet Information service and click on OK

    6- Click Next on the Windows Components

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    72/94

    7- Now insert 2003 server CD when it promoted.

    8- Click Finish on the Completing the Windows Components Wizard

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    73/94

    Configuration of IIS.

    1- Now after installing IIS, Inetpub folder created in C: drive by default.

    2- Create directory in this folder

    3-And now create html file in this folder

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    74/94

    4- Now go to IIS wizard, by click on administrative tools.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    75/94

    5- Now open the IIS wizard.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    76/94

    6- Click on plus sign of web site and delete the default web site.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    77/94

    7- right click on web site.

    8-Now point the mouse to the New and click on web site

    9- Click on Next of welcome wizard of the web site.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    78/94

    10- Type the description into Description box.

    11- click on next

    12- Assign the IP address through which you want to access the web site &

    click on next.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    79/94

    13- Give the path of directory click on Next.

    14- Now give the accessing permission click on Next

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    80/94

    15- Now click on Finish wizard

    16- Now configure the IP address at the client computer.\

    17- Now type the following path to the address bar of the internet explorer.

    http://ip address of the Server Computer/name of file

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    81/94

    18- Now you are able to access Web Server.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    82/94

    INSTALLATION OF FTP SERVER

    FTP is an acronym for File Transfer Protocol. As the name suggests, FTP is used to

    transfer files between computers on a network.You can use FTP to exchange files

    between computer accounts, transfer files between an account and a desktopcomputer, or access online software archives.However, that many FTP sites are

    heavily used and require several attempts before connecting.

    Steps of Installation of FTP Server.

    1- Because FTP depends on Microsoft Internet Information Services (IIS), IIS

    and the FTP Service must be installed on the computer.

    2- Click Start, point to Control Panel, and then click Add or Remove Programs.

    3- Click Add/Remove Windows Components

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    83/94

    4- In the Components list, click Application Server.

    5- Click on details.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    84/94

    6- Now select on Internet Information Service and click on Details.

    7- Now check in to File Transfer Protocol Service and now click on OK.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    85/94

    8- Now Click on Ok & click on next.

    9- Now click on Finish.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    86/94

    Configuration of FTP Server.

    1- Now default ftp directory (ftproot) created in Inetpub folder in the c: drive

    2- Start Internet Information Services Manager or open the IIS snap-in.

    3-Expand Server_name, where Server_name is the name of the server

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    87/94

    4-Expand FTP Sites

    5- Right-click Default FTP Site, and then click Properties

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    88/94

    6- Click the Security Accounts tab.

    7- Click to select the Allow Anonymous Connections check box (if it is not already

    selected), and then click to select the Allow only anonymous connections check

    box Now click on OK.

    8

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    89/94

    8- Click the Home Directory tab.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    90/94

    9- Click to select the Read and Log visits check boxes (if they are not already

    selected), and then click to clear the Write check box (if it is not already cleared).

    10- Click on OK.

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    91/94

    11- Quit Internet Information Services Manager or close the IIS snap-in.

    12- Now open the Internet explorer, and type the following path.

    ftp://ip Address

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    92/94

    CONFIGURATION OF ROUTERS

    Configuration of headquarter(Srinagar) router

    Router(config)#router rip

    Router(configrouter)#version 2

    Router(configrouter)# network 10.10.10.0

    Router(configrouter)# network 100.100.100.0

    Router(configrouter)#no auto summary

    Configuration of Baramulla router

    Router(config)#router rip

    Router(configrouter)#version 2

    Router(configrouter)# network 20.20.20.0

    Router(configrouter)# network 110.110.110.0

    Router(configrouter)#no auto summary

    Configuration of Budgam router

    Router(config)#router rip

    Router(configrouter)#version 2

    Router(configrouter)# network 30.30.30.0

    Router(configrouter)# network 120.120.120.0

    Router(configrouter)#no auto summary

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    93/94

    Configuration of Anantnag router

    Router(config)#router rip

    Router(configrouter)#version 2

    Router(configrouter)# network 40.40.40.0

    Router(configrouter)# network 130.130.130.0

    Router(configrouter)#no auto summary

    Configuration of Jammu router

    Router(config)#router rip

    Router(configrouter)#version 2

    Router(configrouter)# network 50.50.50.0

    Router(configrouter)# network 140.140.140.0

    Router(configrouter)#no auto summary

  • 7/30/2019 Network infrastructure MANAGEMENT OF j&k BANK

    94/94

    SUMMARY

    Today computer technology has permeated almost every sphere of modern man.

    Networking, as its important part has found its way in almost every modern

    establishment like offices, universities, government sectors etc and has made

    administration quite efficient.

    Our project is on WAN infrastructure management or simply

    networking of J&k bank. J&k bank is one of the prominent financial institutions of

    Jammu & Kashmir having branches all over India. J&K bank headquarter is

    connected to its branches and other important financial institutions for smooth

    functioning and convenience of clients.

    BIBLIOGRAPHY

    Wikipedia

    Data communications by Farouzan

    Data communications by Stallings

    www.google .com

    amazon.com

    computer networks.

    http://www.google/http://www.google/