Individual Assignment Technology Park Malaysia
Individual Assignment Technology Park Malaysia
CT043-3-1-IN
INTRODUCTION TO NETWORKING
WEIGHTAGE: 50%
INSTRUCTIONS TO CANDIDATES:
2 Students are advised to underpin their answers with the use of references
(cited using the Harvard Name System of Referencing).
1.1 Objectives....................................................................................................................4
1.2 Scopes..........................................................................................................................4
1.3 Limitations...................................................................................................................4
2 Assumptions........................................................................................................................5
4 Number of hosts..................................................................................................................8
6 IP Adressing scheme.........................................................................................................10
7 Network devices...............................................................................................................11
Conclusion................................................................................................................................13
Networking is the exchange of information and ideas among people with a common
profession or special interest, usually in an informal social setting. The term computer
networking refers to linking multiple devices so that they can readily share
information and software resources. (Investopedia, 2019)
The three major types of networks are Local Area Network (LAN), Metropolitan Area
Network (MAN) and Wide Area Network (WAN). LAN is a type of computer
network which connects the computers within a limited area. They are mainly used in
home, office buildings, school or university. MAN is a type of computer network
which connects computer resources and users within a geographical area. It is larger
than local area network and smaller than wide area network. WAN is a type of
computer network which connects smaller networks consisting of local area and
metropolitan area networks across the cities, states and countries. The user and
computers of one location can communicate with other user of another location.
Asia Pacific University of Technology and Innovation (APU), Malaysia has decided
to expand their business to have training center. We have been appointed as a network
technician to design suitable network. Among the three-computer network mentioned
above, Local Area Network (LAN) is used to design a network that connects training
centers with the APU corporate training services. There are many topologies that can
be used in LAN i.e. Bus, Ring, Star but we have used Bus topology and Star topology.
Bus topology is a type of topology in which computers and network devices are
connected to a single cable or node. We have used wired connection to join the
computer devices. Bus topology is used in connecting the main APU office and the
Corporate Training office. Corporatetraining office and Testing Centers are also
connected using bus topology. Star topology is the network topology in which
different individual computers are connected in center node. It is used in connecting
the computers in block 1 i.e. Corporate Training office and block 2 i.e. Testing
Centers.
1.1 Objectives
1.2 Scopes
Backup of data is easy as all data are stored on file server or storage server.
1.3 Limitations
Unauthorized user can access the information if sever computer is not secured
properly.
For the network design and configuration, the following assumption is made:
The floor plan as accord to the diagram has two buildings. One is Office building and the
other is the training building. Below is the description of the floor plan.
This building has one server room and a staff lounge. In the server room, there is one main
computer, File server device and server switch. The computer is connected to the server
switch which is linked with the main server with router and file as well as storage server. The
server with router is directly connected to the internet.
Further, the server with the router connects with the wireless router which provides wireless
connection to the wireless devices inside the staff lounge.
Inside the training building, there are two departments. They are Cafeteria and Control Room.
Here, again the main line comes from the server with router to the switch inside the control
room which distributes to the computer and other connection links to the wireless router
inside the Cafeteria. The Cafeteria’s wireless router will be providing internet connection to
the wireless devices inside the cafeteria’s premises.
All the information and data will further transfer to the university’s main server from cloud
access.
4 Number of hosts
There exist of two building one for co-orporate trainning office and another testing center.
Each on has its own host and in total,it includes of 256 host.
As every router is configured with maximum number of 254 hosts,that can connect to a
particular router at the same time. And the subnet was configured in class C. Where, the
maximum number of host that can connect to the APU network are 768. For testing purpose,
we used limited number of host of 8 different network devices that includes of Personalized
computer.
5 Justification of the Topology
We have used bus topology to connect the main APU office and the corporate training office.
Bus topology
Thisnetwork topology connects the computer devices to a single cable. It is used while
connecting the corporate training office and testing center. If the main server is interrupted
then all network is interrupted. Here the APU cable acts as a backbone for the network. And
this topology has made easier in connecting all the peripheral devices and computer.
Star Topology
This topology consists of one central point (switch) that is connected with all nodes in a
network.The server room and the staff lounge are connected to one single switch using the
star topology. The failure in single computer will not affect the network or other computers.
So, this network is very reliable and flexible and data transfer is very high and faster.
6 IP Adressing scheme
7 Network devices
1. Router
Routers are the network devices that connect two or more computer networks. It operates in
the Layer 3 i.e. network layer. In this network connection, routers are used to connect local
network to another local network. There are three routers used in designing the network. The
router1 of APU office is the main router for the network. The LAN of main APU office is
connected to LANs of two blocks through the routers. A router has used IP address to
determine where to send the data packet. Router2 of corporate training office is connected to
router3 of testing center. Bus topology is used when in connecting the routers.
2. Switch
Switch is the network device that connects computer devices to a single computer network. It
operates in Layer 2 i.e. data link layer. In this network, switches are used to connect the
devices together with computer network. It is more advanced and reliable than hub. MAC
address is used in switch. There are all together three switches used in this network. Switch1
is used in main APUoffice building. And another two switches i.e. switch2 and switch3 are
used in block 1 i.e. Corporate Training Office and block 2 i.e. Testing Center respectively.
They connect the computers located in main office, staff lounge, cafeteria, control room, lab
and classrooms.
3. Computer
Desktop computers are used in main office and two blocks. Desktop computers are the
personal computers located on a fixed location either desk or table. Two desktop computers
are used in the main APU office. Another two desktop computers are used in block 1 i.e. in
Corporate Training Office. There are two rooms. One is server room and another staff lounge
where one desktop computer is used in each. Four computers in the block 2 i.e. in Testing
Centers is used. There are four room in block 2 i.e. cafeteria, control room, lab and
classroom. One computer is used in each room.
4. Storage server
Servers are the computer which provides data and information to other client computers on
local area network or wide area network. We have used local area network so data is
transferred on it. There is main server located in the main APU building. It processes request
and provides data over local area network. The client computers in training office and testing
centers sends request to the main server and it delivers the required information to the client
computers. And the data and information of the client computers are stored in the main server
of APU building.
Conclusion
This assignment is done in order to design and configure local area network of two blocks.
This includes the network access of the APU campus branch where all the data can be
transferred easily.
This project has helped each and every one of us to get a thorough knowledge on how a
project is handled and carried out. We got to know how a network is created and how the data
flow mechanism works. Not only we learned about networks but we also got an insight on
data structure and the algorithm behind how a network works. We learned to work as a team.
And as a part of the team, we learned to plan, co-ordinate, gather information and research.
We thank each and every one who helped and are involved in completing this assignment.
8 Individual (Karina Shilpakar NP000352)
Block1
Topology justification
Topology is very crucial while designing any network. It should be known regarding the
connection of notes and way of transfer of data in network. Network performance is greatly
dictated by concept of networking and type of topology used. Detection of errors is easier by
using topology.
We have used bus topology to connect the main APU office and the corporate training office.
Bus topology is a network topology that connects the computer devices to a single cable. Bus
topology is used while connecting the corporate training office and testing center. If the main
server is interrupted then all network is interrupted. Star topology is used in the block1 i.e.
Corporate Training office. It consists of one server room and staff lounge. Star topology is
the network topology in which all individual nodes are connected to central connection point.
The server room and the staff lounge are connected using the star topology. So, if there is
failure in single computer it does not affect the network or other computers. It is very reliable
and flexible. The data transfer is very high and faster.
Network Performance
Network performance is the quality of the network. Network performance is becoming more
important nowadays as there are more demands on networks. If the network performance is
good and effective, then there is more user satisfaction. The network performance mainly
focuses on the data quality and data speed. It is measured from a user perspective. Some of
the components that must be analyzed before measuring the performance of network are:
network capacity, network throughput, data loss and errors. The hardware devices (routers,
switches), security issues, type of application are the factors which affects the network
performance.
We have used local area network for designing the network in Corporate Training office. We
have analyzed the statistic of network to recognize area of improvement and reduce problems
that might arise in the network. The devices are connected using cable wires. The data
transference is easy and with the high speed. It is easy to maintain and design. High quality of
network hardware like switches, routers, cables, networking software (security, operating
system) and network services (such as IP addressing) are used. It increases the network
performance. If the hardware components are of low quality, it directly affects the user
experience.
Applications that boost the network performance are used as it directly affects the user
experiences. The poor performing applications can consume more bandwidth and affects user
experience. Security issue also affects the performance so, there is data encryption, virus
protection and intrusion detection software. These consume bandwidth and impact in network
performance.
And after completing designing the network we checked the network performance. We found
the performance of the network is fast and effective. So, the data is transferred in time. All
activities are performed easily, faster and without any disturbance. In this way, we have used
the high quality of switch, cables, routers and applications to increase network performance
which also increases the user experience.
9 Individual (Deena tamang NP000351)
Block1
IP Addressing Justification
In the network, every device has its own unique identifier that is used while transferring data.
The use of IP/TCP protocol in any device to identify it is said as its IP address. This IP
address has two standards: IP version 4(IPv4) and IP version 6(IPv6).
Here, we have used IP version 4(IPv4) in order to create a single unique address on the
network with four numbers separated by dots. For example: 192.168.1.1. As this is a logical
addresses which helps in building a hierarchy in the addressing schema easily. It includes
routing the packets from one network to another network. In the network with connection of
all interfaces has a common identifier and that is embedded in the IP address which can be
abstracted using network mask. And the IP address has combination of host number on right
and network number on the left
R2:
Interface: fa 0/0
IP address:192.168.1.165
Interface: serial3/0
IP address:192.168.1.97
PC server:
IP address: 192.168.1.66
PC staff lounge:
IP address: 192.168.1.67
Network Reliability
Computer network is the interconnection of the different nodes that are allocated for sharing
data and information. Network reliability is one of the computer network measures which
express the presence of the faults in the performance of the computer network.Network
reliability measures all the nodes used in network are operating and communicating with each
other at overall time interval.
This network reliability is also understood as a repairable flow network. Here, the network is
determined on the basis of their operation that is working or not. It even measures the
probability of the correct operation with no any fault occurrence at the entire time. This is
important for any network to run smoothly with no any faults carrying during the data
transfer from source to nodes.
Advantages:
After completion of the network design in cisco packet tracer, we analyzed our network is
operate able and reliable at any time or not. This helped in replacement of some faulty
components in the network. Even the hardware and software component used in this network
is trustworthy, best and reliable because it is built by ‘CISCO’. Also, the wire used in this
network is military grade protection which is much reliable in order to transfer the data. From
this we can know our network is operational and has better performance.
10 Individual (Aashish Basnet NP000346)
Building 2
IP Addressing Justification
This is a numeric value assigned to the all the devices like router, PC, etc. to be connected to a
network. They use IP/TCP protocol for communicating purpose within the network between devices.
It also includes identification and location addressing of two main functions that is host and network
interface.
Network Manageability
Network management contains the integration, coordination and deployment of the software,
hardware and human elements to test, monitor, investigate and estimate the network
resources to meet the real time, operational performance and QoS condition at a sensible cost.
The combination between hardware and software which is used for administer and
monitoring a network is called Network Management System (NMS).
1. Fault Management: Identify, separate, inform, and right blames experienced in the
system.
2. Configuration Management: Arrangement parts of system gadgets, for example,
design record the executives, stock administration, and programming the executives.
3. Performance Management: Display and amount of different parts of execution with
the goal that general execution can be kept up at a worthy level.
4. Security Management: Provide access to arrange gadgets and corporate assets to
approved people.
5. Accounting Management: Usage data of system assets
The following figure shows a reference engineering that Cisco Systems accepts ought to be
the insignificant answer for dealing with information organize. This business incorporates a
Cisco Call Manager server for the individuals who intend to manage Voice over Internet
Protocol (VoIP). The figure shows how you would coordinate the CallManager server into
the NMS topology.
Network Security
The approaches and configurations that have been designed to defend anonymity, integrity
and transparency of network as well as resources can be defined as network security. In this
modern cyber world, every business organization, irrespective of size, sector or assets,
requires certain level of network security solutions to prevent it from the growing modern
cyber threat.
Today’s modern technological environment is faced with a number of attackers that are
always in the verse of finding, stealing and destroying vulnerable data and information. These
exist in a wide range of areas, which include users, locations, devices as well as data. This
results for increment of the security of the network, which requires tools such as network
security management application. These tools tackle all the dangers and mistreatment that are
threat to the network. This is vital because even few minutes of down server can result in
huge damage and loss of the data, which can immensely affect to the reputation of the
organization.
It is important to check the access granted to the users, authorized or unauthorized, from
accessing the network. This level of security helps to control the security policies enforced
for both users and the devices connected. The feature such as blocking access to the
unauthorized users can also be given account.
2. Firewalls
It is a middle barrier that connects unsafe external network to the trusted internal network. It
is a defined set of rules that allows or blocks network traffic from entering the network. It
monitors the computer system’s network connections and efficiently manages traffic usage
whether physical or virtual.
3. Antivirus Software
These are the programs that help to detect worms, Trojans, viruses, ransom wares, and
spywares which are a great threat to any network as well as personal systems. It handles the
coercion firstly by scanning the whole system and then removing the infection.
In this level of security, network communication between the ISP and the user is done via
tunneling which is a typical secure encryption. It needs the authentication of the user for
allowing the transfer of data between two points, which is encrypted. A VPN commonly uses
SSL (Secure Sockets Layer) or IPSec for authentication of the device and network.
Topology Justification
In this assignment, both star as well as bus topology has been used as appropriate topology.
This section covers Star Topology Justification.
Star Topology
In this topology, the link has bound each node (i.e. workstations, peripherals and file server)
to a central node. This monitors and cares for all the network-connected devices. A direct
association of each device can be seen attached to the fundamental nodule; by using the
fundamental nodule, each node is seen connected to all the other nodes.
The data approaches its target in this topology only by going via the central hub or switch.
All operations and transfers of data are controlled by the main hub along with restriction. A
star topology is equipped using a coaxial cable, twisted pair or optical fiber. The most
prevalent cable used in this topology is twisted pair.
Advantages
Disadvantages
DOUGLAS E. COMER, D. L., 2004. INTERNETWORKING WITH TCP/IP VOLUME II. Third ed. New Delhi,
Patparganj: 1995 by Pearson Education.
Dr. Madhulika Jain, V. P. S. J., 2002. Computer Networks. First ed. Connaught Place, New Delhi:
Manish Jain for BPB Publications.
NIIT, 2013. Basics of Networking. New Delhi: Asoke K. Ghosh, PHI learning Limited.
S.Tanenbaum, A., 2002. Computer Network. Third ed. New Delhi: Pearson Education.
Tanenbaum, A. S., 2009. Computer Networks. Fourth Edition ed. Patparganj,Delhi,India: Pearson
education.