0% found this document useful (0 votes)
194 views25 pages

Individual Assignment Technology Park Malaysia

The document outlines a network design for connecting Asia Pacific University of Technology and Innovation's main office to new training centers. Bus topology is used to connect the main office and corporate training office, and between the corporate training office and testing centers. Star topology connects computers within the corporate training office and testing centers. The network includes 8 host devices across the main office, corporate training office, and two testing center blocks. IP addresses are assigned using class C subnetting to allow for up to 768 connected devices.

Uploaded by

Samir Giri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
194 views25 pages

Individual Assignment Technology Park Malaysia

The document outlines a network design for connecting Asia Pacific University of Technology and Innovation's main office to new training centers. Bus topology is used to connect the main office and corporate training office, and between the corporate training office and testing centers. Star topology connects computers within the corporate training office and testing centers. The network includes 8 host devices across the main office, corporate training office, and two testing center blocks. IP addresses are assigned using class C subnetting to allow for up to 768 connected devices.

Uploaded by

Samir Giri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 25

INDIVIDUAL ASSIGNMENT

TECHNOLOGY PARK MALAYSIA

CT043-3-1-IN

INTRODUCTION TO NETWORKING

HAND OUT DATE: 6th August 2019

HAND IN DATE: 15th December 2019

WEIGHTAGE: 50%

INSTRUCTIONS TO CANDIDATES:

1 Submit your assignment at the administrative counter.

2 Students are advised to underpin their answers with the use of references
(cited using the Harvard Name System of Referencing).

3 Late submission will be awarded zero (0) unless Extenuating


Circumstances (EC) are upheld.

4 Cases of plagiarism will be penalized.

5 The assignment should be bound in an appropriate style (comb bound or


stapled).

6 Where the assignment should be submitted in both hardcopy and


softcopy, the softcopy of the written assignment and source code (where
appropriate) should be on a CD in an envelope / CD cover and attached to
the hardcopy.

7 You must obtain 50% overall to pass this module.


Table of content
1. Introduction.........................................................................................................................3

1.1 Objectives....................................................................................................................4

1.2 Scopes..........................................................................................................................4

1.3 Limitations...................................................................................................................4

2 Assumptions........................................................................................................................5

3 Layout of the building.........................................................................................................6

4 Number of hosts..................................................................................................................8

5 Justification of the Topology..............................................................................................9

6 IP Adressing scheme.........................................................................................................10

7 Network devices...............................................................................................................11

Conclusion................................................................................................................................13

8 Individual (Karina Shilpakar NP000352).........................................................................14

9 Individual (Deena tamang NP000351).............................................................................16

10 Individual (Aashish Basnet NP000346)........................................................................18

11 Individual (Arbin shresthaNP000348)..........................................................................20


1. Introduction

Networking is the exchange of information and ideas among people with a common
profession or special interest, usually in an informal social setting. The term computer
networking refers to linking multiple devices so that they can readily share
information and software resources. (Investopedia, 2019)

The three major types of networks are Local Area Network (LAN), Metropolitan Area
Network (MAN) and Wide Area Network (WAN). LAN is a type of computer
network which connects the computers within a limited area. They are mainly used in
home, office buildings, school or university. MAN is a type of computer network
which connects computer resources and users within a geographical area. It is larger
than local area network and smaller than wide area network. WAN is a type of
computer network which connects smaller networks consisting of local area and
metropolitan area networks across the cities, states and countries. The user and
computers of one location can communicate with other user of another location.

Asia Pacific University of Technology and Innovation (APU), Malaysia has decided
to expand their business to have training center. We have been appointed as a network
technician to design suitable network. Among the three-computer network mentioned
above, Local Area Network (LAN) is used to design a network that connects training
centers with the APU corporate training services. There are many topologies that can
be used in LAN i.e. Bus, Ring, Star but we have used Bus topology and Star topology.

Bus topology is a type of topology in which computers and network devices are
connected to a single cable or node. We have used wired connection to join the
computer devices. Bus topology is used in connecting the main APU office and the
Corporate Training office. Corporatetraining office and Testing Centers are also
connected using bus topology. Star topology is the network topology in which
different individual computers are connected in center node. It is used in connecting
the computers in block 1 i.e. Corporate Training office and block 2 i.e. Testing
Centers.
1.1 Objectives

The main objective in designing the network is:

 To connect the training center with the main building.

 To allow sharing of data, resources.

 To design the network using LAN topology.

1.2 Scopes

The scopes of designing the network are:

 Transmission of data is faster.

 Easy to maintain and design the network.

 Errors and noise are minimized as it covers short distance.

 Backup of data is easy as all data are stored on file server or storage server.

 We can install multiple nodes.

1.3 Limitations

Some of the limitations of this network are:

 The initial setup cost is very high.

 All computer stops working if the main server is corrupted.

 Unauthorized user can access the information if sever computer is not secured
properly.

 The network will be low if we add more additional devices.


2 Assumptions

For the network design and configuration, the following assumption is made:

 There is three LAN topology by applying basic principles of wired network.


 There will be heavy data transfer within main office (APU)to the branch office (APU
corporate training service).
 There are two blocks located south to the main building. So, less cost is required for
leased line connection from main office to two block office.
 Main office and two blocks are connected through leased line connection as there is
heavy data transfer between sites.
 To connect the main APU office and the block office 2 interface will be used in the
gateway router.
 There are eight hosts computer which includes APU campus with block 1 and block
2.
3 Layout of the building
i. Description of the Floor Plan

The floor plan as accord to the diagram has two buildings. One is Office building and the
other is the training building. Below is the description of the floor plan.

ii. Office Building

This building has one server room and a staff lounge. In the server room, there is one main
computer, File server device and server switch. The computer is connected to the server
switch which is linked with the main server with router and file as well as storage server. The
server with router is directly connected to the internet.

Further, the server with the router connects with the wireless router which provides wireless
connection to the wireless devices inside the staff lounge.

iii. Training Building

Inside the training building, there are two departments. They are Cafeteria and Control Room.
Here, again the main line comes from the server with router to the switch inside the control
room which distributes to the computer and other connection links to the wireless router
inside the Cafeteria. The Cafeteria’s wireless router will be providing internet connection to
the wireless devices inside the cafeteria’s premises.

All the information and data will further transfer to the university’s main server from cloud
access.
4 Number of hosts

There exist of two building one for co-orporate trainning office and another testing center.
Each on has its own host and in total,it includes of 256 host.

As every router is configured with maximum number of 254 hosts,that can connect to a
particular router at the same time. And the subnet was configured in class C. Where, the
maximum number of host that can connect to the APU network are 768. For testing purpose,
we used limited number of host of 8 different network devices that includes of Personalized
computer.
5 Justification of the Topology

Network topology is the interconnected of network which may be physical, mapping


hardware configuration, or logical, mapping the path that the data must take in order to travel
around the network.

We have used bus topology to connect the main APU office and the corporate training office.

Bus topology

Thisnetwork topology connects the computer devices to a single cable. It is used while
connecting the corporate training office and testing center. If the main server is interrupted
then all network is interrupted. Here the APU cable acts as a backbone for the network. And
this topology has made easier in connecting all the peripheral devices and computer.

Star Topology

This topology consists of one central point (switch) that is connected with all nodes in a
network.The server room and the staff lounge are connected to one single switch using the
star topology. The failure in single computer will not affect the network or other computers.
So, this network is very reliable and flexible and data transfer is very high and faster.
6 IP Adressing scheme
7 Network devices

The network devices used while designing the network are:

1. Router

Routers are the network devices that connect two or more computer networks. It operates in
the Layer 3 i.e. network layer. In this network connection, routers are used to connect local
network to another local network. There are three routers used in designing the network. The
router1 of APU office is the main router for the network. The LAN of main APU office is
connected to LANs of two blocks through the routers. A router has used IP address to
determine where to send the data packet. Router2 of corporate training office is connected to
router3 of testing center. Bus topology is used when in connecting the routers.

2. Switch

Switch is the network device that connects computer devices to a single computer network. It
operates in Layer 2 i.e. data link layer. In this network, switches are used to connect the
devices together with computer network. It is more advanced and reliable than hub. MAC
address is used in switch. There are all together three switches used in this network. Switch1
is used in main APUoffice building. And another two switches i.e. switch2 and switch3 are
used in block 1 i.e. Corporate Training Office and block 2 i.e. Testing Center respectively.
They connect the computers located in main office, staff lounge, cafeteria, control room, lab
and classrooms.

3. Computer

Desktop computers are used in main office and two blocks. Desktop computers are the
personal computers located on a fixed location either desk or table. Two desktop computers
are used in the main APU office. Another two desktop computers are used in block 1 i.e. in
Corporate Training Office. There are two rooms. One is server room and another staff lounge
where one desktop computer is used in each. Four computers in the block 2 i.e. in Testing
Centers is used. There are four room in block 2 i.e. cafeteria, control room, lab and
classroom. One computer is used in each room.
4. Storage server

Servers are the computer which provides data and information to other client computers on
local area network or wide area network. We have used local area network so data is
transferred on it. There is main server located in the main APU building. It processes request
and provides data over local area network. The client computers in training office and testing
centers sends request to the main server and it delivers the required information to the client
computers. And the data and information of the client computers are stored in the main server
of APU building.
Conclusion
This assignment is done in order to design and configure local area network of two blocks.
This includes the network access of the APU campus branch where all the data can be
transferred easily.

This project has helped each and every one of us to get a thorough knowledge on how a
project is handled and carried out. We got to know how a network is created and how the data
flow mechanism works. Not only we learned about networks but we also got an insight on
data structure and the algorithm behind how a network works. We learned to work as a team.
And as a part of the team, we learned to plan, co-ordinate, gather information and research.
We thank each and every one who helped and are involved in completing this assignment.
8 Individual (Karina Shilpakar NP000352)

Block1

Topology justification

When network elements (links, nodes) of communication network are interconnected,


network topology is formed. It can also be defined as arrangement of various types of
telecommunication network which includes command and control networks & computer
networks. Network topology is formulated using graph theory and can be depicted physically
or logically. Physical topology is defined as the physical placement of different components
of network whereas Logical topology deals with the flow of data within a network.

Topology is very crucial while designing any network. It should be known regarding the
connection of notes and way of transfer of data in network. Network performance is greatly
dictated by concept of networking and type of topology used. Detection of errors is easier by
using topology.

Here, we have used Bus topology in connecting Administa

We have used bus topology to connect the main APU office and the corporate training office.
Bus topology is a network topology that connects the computer devices to a single cable. Bus
topology is used while connecting the corporate training office and testing center. If the main
server is interrupted then all network is interrupted. Star topology is used in the block1 i.e.
Corporate Training office. It consists of one server room and staff lounge. Star topology is
the network topology in which all individual nodes are connected to central connection point.
The server room and the staff lounge are connected using the star topology. So, if there is
failure in single computer it does not affect the network or other computers. It is very reliable
and flexible. The data transfer is very high and faster.

Network Performance

Network performance is the quality of the network. Network performance is becoming more
important nowadays as there are more demands on networks. If the network performance is
good and effective, then there is more user satisfaction. The network performance mainly
focuses on the data quality and data speed. It is measured from a user perspective. Some of
the components that must be analyzed before measuring the performance of network are:
network capacity, network throughput, data loss and errors. The hardware devices (routers,
switches), security issues, type of application are the factors which affects the network
performance.

We have used local area network for designing the network in Corporate Training office. We
have analyzed the statistic of network to recognize area of improvement and reduce problems
that might arise in the network. The devices are connected using cable wires. The data
transference is easy and with the high speed. It is easy to maintain and design. High quality of
network hardware like switches, routers, cables, networking software (security, operating
system) and network services (such as IP addressing) are used. It increases the network
performance. If the hardware components are of low quality, it directly affects the user
experience.

Applications that boost the network performance are used as it directly affects the user
experiences. The poor performing applications can consume more bandwidth and affects user
experience. Security issue also affects the performance so, there is data encryption, virus
protection and intrusion detection software. These consume bandwidth and impact in network
performance.

And after completing designing the network we checked the network performance. We found
the performance of the network is fast and effective. So, the data is transferred in time. All
activities are performed easily, faster and without any disturbance. In this way, we have used
the high quality of switch, cables, routers and applications to increase network performance
which also increases the user experience.
9 Individual (Deena tamang NP000351)

Block1

IP Addressing Justification
In the network, every device has its own unique identifier that is used while transferring data.
The use of IP/TCP protocol in any device to identify it is said as its IP address. This IP
address has two standards: IP version 4(IPv4) and IP version 6(IPv6).

Here, we have used IP version 4(IPv4) in order to create a single unique address on the
network with four numbers separated by dots. For example: 192.168.1.1. As this is a logical
addresses which helps in building a hierarchy in the addressing schema easily. It includes
routing the packets from one network to another network. In the network with connection of
all interfaces has a common identifier and that is embedded in the IP address which can be
abstracted using network mask. And the IP address has combination of host number on right
and network number on the left

IP address used in block one are:

R2:

Interface: fa 0/0

IP address:192.168.1.165

Interface: serial3/0

IP address:192.168.1.97

PC server:

IP address: 192.168.1.66

PC staff lounge:

IP address: 192.168.1.67
Network Reliability
Computer network is the interconnection of the different nodes that are allocated for sharing
data and information. Network reliability is one of the computer network measures which
express the presence of the faults in the performance of the computer network.Network
reliability measures all the nodes used in network are operating and communicating with each
other at overall time interval.

This network reliability is also understood as a repairable flow network. Here, the network is
determined on the basis of their operation that is working or not. It even measures the
probability of the correct operation with no any fault occurrence at the entire time. This is
important for any network to run smoothly with no any faults carrying during the data
transfer from source to nodes.

Advantages:

 It helps system to work with no fault occurrence


 It implies backing up the information
 It prompts in smooth working of the system
 It helps in determining the probability that all the nodes are operational

After completion of the network design in cisco packet tracer, we analyzed our network is
operate able and reliable at any time or not. This helped in replacement of some faulty
components in the network. Even the hardware and software component used in this network
is trustworthy, best and reliable because it is built by ‘CISCO’. Also, the wire used in this
network is military grade protection which is much reliable in order to transfer the data. From
this we can know our network is operational and has better performance.
10 Individual (Aashish Basnet NP000346)
Building 2
IP Addressing Justification

This is a numeric value assigned to the all the devices like router, PC, etc. to be connected to a
network. They use IP/TCP protocol for communicating purpose within the network between devices.
It also includes identification and location addressing of two main functions that is host and network
interface.

Network Manageability

Network management is a service that employees provides assortment of applications, tools


and device to support human network managers in the control and conservation of a network.

Network management contains the integration, coordination and deployment of the software,
hardware and human elements to test, monitor, investigate and estimate the network
resources to meet the real time, operational performance and QoS condition at a sensible cost.

The combination between hardware and software which is used for administer and
monitoring a network is called Network Management System (NMS).

There is five ISO network management models’ which is described below:

1. Fault Management: Identify, separate, inform, and right blames experienced in the
system.
2. Configuration Management: Arrangement parts of system gadgets, for example,
design record the executives, stock administration, and programming the executives.
3. Performance Management: Display and amount of different parts of execution with
the goal that general execution can be kept up at a worthy level.
4. Security Management: Provide access to arrange gadgets and corporate assets to
approved people.
5. Accounting Management: Usage data of system assets
The following figure shows a reference engineering that Cisco Systems accepts ought to be
the insignificant answer for dealing with information organize. This business incorporates a
Cisco Call Manager server for the individuals who intend to manage Voice over Internet
Protocol (VoIP). The figure shows how you would coordinate the CallManager server into
the NMS topology.

The network management


architecture contains:

 Computer network design


 Functional organization and configuration of physical component
11 Individual (Arbin shresthaNP000348)

Network Security

The approaches and configurations that have been designed to defend anonymity, integrity
and transparency of network as well as resources can be defined as network security. In this
modern cyber world, every business organization, irrespective of size, sector or assets,
requires certain level of network security solutions to prevent it from the growing modern
cyber threat.

Today’s modern technological environment is faced with a number of attackers that are
always in the verse of finding, stealing and destroying vulnerable data and information. These
exist in a wide range of areas, which include users, locations, devices as well as data. This
results for increment of the security of the network, which requires tools such as network
security management application. These tools tackle all the dangers and mistreatment that are
threat to the network. This is vital because even few minutes of down server can result in
huge damage and loss of the data, which can immensely affect to the reputation of the
organization.

Network Security Basics

According to Stephen Northcutt, writer of “A Primer on the Basics of Network Security”,


network security consists of:

 Protection - Configuring systems and networks correctly.


 Detection - Identifying network traffics signifying a problem.
 Reaction - Responding to the problems.

Some Major Types of Network Security

1. Network Access Control

It is important to check the access granted to the users, authorized or unauthorized, from
accessing the network. This level of security helps to control the security policies enforced
for both users and the devices connected. The feature such as blocking access to the
unauthorized users can also be given account.

2. Firewalls

It is a middle barrier that connects unsafe external network to the trusted internal network. It
is a defined set of rules that allows or blocks network traffic from entering the network. It
monitors the computer system’s network connections and efficiently manages traffic usage
whether physical or virtual.

3. Antivirus Software

These are the programs that help to detect worms, Trojans, viruses, ransom wares, and
spywares which are a great threat to any network as well as personal systems. It handles the
coercion firstly by scanning the whole system and then removing the infection.

4. VPN(Virtual Private Network)

In this level of security, network communication between the ISP and the user is done via
tunneling which is a typical secure encryption. It needs the authentication of the user for
allowing the transfer of data between two points, which is encrypted. A VPN commonly uses
SSL (Secure Sockets Layer) or IPSec for authentication of the device and network.

Topology Justification

In this assignment, both star as well as bus topology has been used as appropriate topology.
This section covers Star Topology Justification.

Star Topology

In this topology, the link has bound each node (i.e. workstations, peripherals and file server)
to a central node. This monitors and cares for all the network-connected devices. A direct
association of each device can be seen attached to the fundamental nodule; by using the
fundamental nodule, each node is seen connected to all the other nodes.

The data approaches its target in this topology only by going via the central hub or switch.
All operations and transfers of data are controlled by the main hub along with restriction. A
star topology is equipped using a coaxial cable, twisted pair or optical fiber. The most
prevalent cable used in this topology is twisted pair.

Advantages

 Troubleshoot is easy to carry out.


 Setting up and modification of the devices is easy to carry out.
 The entire network will not be affected just by the failure of one node.
 There is no disturbance to the network if any devices are added, removed, modified or
reconfigured in star topology.
 More cabling is not necessary as less cabling is possible without any hassle.

Disadvantages

 Comparatively expensive for installation as compared to other network topologies.


 The power, efficiency and the configuration majorly affects the performance of the
entire network.
 Central hub is the major component in this topology. The failure of the system is a
result of the failure of the central hub. This makes one of the major disadvantages of
star topology.
12 References
Anon., 2019. what is a computer network? type and defination. [Online]
Available at: https://study.com/academy/lesson/what-is-a-computer-network-types-definition-
quiz.html
[Accessed 27 11 2019].

Beal, V., 2019. webopedia. [Online]


Available at: https://www.webopedia.com/quick_ref/topologies.asp
[Accessed 01 12 2019].

DOUGLAS E. COMER, D. L., 2004. INTERNETWORKING WITH TCP/IP VOLUME II. Third ed. New Delhi,
Patparganj: 1995 by Pearson Education.

Dr. Madhulika Jain, V. P. S. J., 2002. Computer Networks. First ed. Connaught Place, New Delhi:
Manish Jain for BPB Publications.

Fruhlinger, J., 2018. CSO. [Online]


Available at: https://www.csoonline.com/article/3285651/what-is-network-security-definition-
methods-jobs-and-salaries.html
[Accessed 03 11 2019].

NIIT, 2013. Basics of Networking. New Delhi: Asoke K. Ghosh, PHI learning Limited.

S.Tanenbaum, A., 2002. Computer Network. Third ed. New Delhi: Pearson Education.

Spacey, J., 2018. Simplicable. [Online]


Available at: https://simplicable.com/new/network-performance
[Accessed 28 11 2019].

Tanenbaum, A. S., 2009. Computer Networks. Fourth Edition ed. Patparganj,Delhi,India: Pearson
education.

You might also like