In Assignment Tutorial 7 Group 2
In Assignment Tutorial 7 Group 2
INTRODUCTION TO NETWORKING
GROUP ASSIGNMENT
TECHNOLOGY PARK MALAYSIA
CT043-3-1-IN
INTRODUCTION TO NETWORKING
INTAKECODE
APU1F2009CS
Group Members:
1. Wong Hui Chuo [TP055409]
2. Lee Zi Rock [TP061724]
3. Teh Yu Xiang [TP061913]
4. Li Bo Wen [TP061330]
CT043-3-1-IN INTRODUCTION TO NETWORKING
Table of Contents
1.0 Introduction.....................................................................................................................................2
1.1 Objectives....................................................................................................................................2
1.2 Background of the Company.......................................................................................................2
1.3 Assumption..................................................................................................................................2
2.0 Layout of the building......................................................................................................................3
2.1Floor Plan......................................................................................................................................4
2.1.1 KL Site Floor 1.......................................................................................................................4
2.1.2 KL Site Floor 2.......................................................................................................................8
2.1.3 SG Site Floor 1.....................................................................................................................11
2.1.4 SG site Floor 2.....................................................................................................................14
3.0 Topology Diagram..........................................................................................................................18
3.1 Physical Topology......................................................................................................................19
3.1.1 KL Physical Topology...............................................................................................................19
3.1.2 SG Physical Topology...............................................................................................................22
3.2 Topology Justifications...............................................................................................................25
3.2.1 Network Topology..................................................................................................................25
4.0 IP Addressing scheme....................................................................................................................34
4.1 IP addressing & subnetting plan................................................................................................34
4.2 VLSM Subnetting Scheme..........................................................................................................36
4.2.1 Number of Hosts.................................................................................................................37
4.2.2 KL Site Networks.................................................................................................................38
4.2.3 SG Site Networks................................................................................................................49
4.3 List of Devices using Static and Dynamic Addressing.................................................................59
4.3.1 Static Addressing................................................................................................................59
4.3.2 Dynamic Addressing...........................................................................................................60
4.3.3 Differences between Static IP address and Dynamic IP address.........................................62
5. Recommendations...........................................................................................................................64
5.1 Security......................................................................................................................................64
5.3 Fibre...........................................................................................................................................64
5.4 Reliability of the Network..........................................................................................................64
6. Conclusion.......................................................................................................................................66
7. References.......................................................................................................................................67
8. Work Breakdown Structure:............................................................................................................69
9. Assessment Criteria: Marks Breakdown..........................................................................................70
1.0 Introduction
1.1 Objectives
The main objectives of this project are to identify the requirement and conduct a
research to propose for a suitable topology diagram with necessary devices and IP addressing
scheme to make it work for XEN Company. Our team will connect the Kuala Lumpur
Malaysia and Singapore buildings with a bandwidth of no less than 100 Mbps and create the
floor plan of the overall buildings for both side of XEN Company. After that, all
communication between building must be secure from eavesdropping. In this project, our
team will also configure network for the management, finance, r and d, engineering, ordering
and delivery department for Kuala Lumpur Malaysia and Singapore Building. Our team will
achieve the objectives by doing research and critical thinking since every department have
different requirement.
1.3 Assumption
For our floor plan design, the complete floor plan will be created in Microsoft Visio.
As for the instruction, there will be ten staff members in each department in the floor plan.
Other than that, the CTO and CEO room will be on the second floor for KL Malaysia and
Singapore building. Each department will include one supervisor in charge. However, the
network configuration of the topology diagram with necessary devices and IP addressing
scheme will be completed by using Cisco Packet Tracer. We will also configure at least one
VOIP Phone in each department to allow the staff to make calls over IP address. And there
will be a bandwidth of no less than 100 Mbps connecting those buildings. The FTP, Email
and the DHCP Server will be built in KL Malaysia building’s Server Room. On the other
side, CRM, HTTP(Web) and DNS Server will be built in Singapore building’s Server Room.
2.1Floor Plan
Figure 7 IT Department
products Printer
Guest 1 Wireless Access
Point, 1 VOIP Phone,
1 PC
SG Sever Room 3 Servers, 8
Switches, 1 Router
TOTAL 48 devices
Justification:
All the network devices location are listed on the Table above. In KL site physical topology, each switch is located in different places and
the router is located in server room. In SG site, all switches and the router are located in server room. Besides, WAP and all end devices are
located as same as the Table above. For detailed location, refer to subject 2.1 Floor Plan which starts at page 3.
In the Network Topology Diagram (Figure 33), we have used Star Topology. The reason we have decided not to use Bus and Ring
Topologies is because, they did not meet the standard of our need when compared to the Star Topology. In Bus topology, all end systems are
chained together and terminated on each end, and it is not great for large networks, because as the devices in the network increases, it will also
slow the network down, which can cause massive packet loss across the devices. [ CITATION pul201 \l 2057 ] In Ring Topology, all devices needed
to be turn on in order to have a proper communication and if one device shuts down, it will affect the whole network. In addition, the Ring
Topology is difficult to troubleshoot, unscalable and expensive when compare to Bus and Star Topologies.[ CITATION pul20 \l 2057 ]
We have used in total 3 types of cable. The first cable is Serial cable (Figure 35), which is used for connecting the two routers from KL
and Singapore. The reason we use this cable for connecting the two routers is because it supports long distance data communication and it is
easy to implement.[ CITATION rfw12 \l 2057 ] We have used a DTE serial cable, means that the router that was being click first will be the DTE. In
our project, SG Router will be the DTE side, it will need to transfer the clock signal, which will be in charge of the clock rate, the speed of the
data is transmitted. On the other end, KL Router will be the DCE, which will be used to accepting clock signal, create, sustain and dismiss
network session among an information foundation and its terminus. [ CITATION Sta20 \l 2057 ]
The second cable is Copper Straight-through cable (Figure 36), which is a kind of warped pair cable commonly used for connecting
distinct devices such as router to switch and, switch to end devices. [ CITATION Cab16 \l 2057 ]
The last cable we used is the Copper Cross-over cable (Figure 37), which is a kind of coaxial cable used for connecting identical
devices such as switch to switches. Its function is as same as Copper Straight-through cable.[ CITATION Cab16 \l 2057 ]
The network architecture we used is the Client/Server Architecture. The main difference between a client server network and a peer-to-
peer network is that client server network is differentiated, and centralized, specific server and clients are present, whereas in peer-to-peer
network, clients are not differentiated and each of them can do both request and respond in the network. In addition, client-server network
mainly focuses on information sharing and are more stable when compared, on the other hand peer to peer network focuses on connectivity and
are less stable as number of peer increases. [ CITATION MKS20 \l 2057 ] Advantages and strength for using client server architecture is that
resources are centralized and data security are controlled by the server. Because of this, the resources can be accessed anywhere and across
multiple platforms. On the other hand, disadvantages and drawback for using client server architecture is that it can become very costly. Due to
the need of devices such as hubs, switches and routers in order to run the network and server, in addition a technical staff will also be needed to
maintain and ensure the network server function correctly.[ CITATION Cad18 \l 2057 ]
We used both dynamic and static routing protocol in our project. The main differences between Dynamic and Static routing protocol are
that Dynamic does not need to configure manually, while as Static will need to configure manually. [ CITATION Cis14 \l 2057 ] RIPv2 also known as
Routing Information Protocol version 2 is actually an enhancement of RIPv1. RIPv2 provide classless routing protocol and subnet masks are
included in the routing update, while RIPv1 did not include these functions. [ CITATION Sun19 \l 2057 ] End Devices used in our project includes
PCs, IP Phones, Printers, FTP Server, Email Server, DHCP Server, CRM Server, HTTP Server and DNS Server.
IP phones which also known as VoIP phones utilize VoIP services (Voice over Internet Protocol), which is a tool that enable people to
communicate across the internet. They attach to the mobile service through the internet, by using either a coaxial cable or Wireless Fidelity
connection. VoIP phones function through analysis of a single similar analogue voice frequency and altering these data into electronic
frequency. These transformed electronic frequency are later transfer together to internet server, as data. [ CITATION Tho17 \l 2057 ]
Printers that we used are network printer. It works as a part of a network that can be used by devices that are connected to it wirelessly.
Positive by using network printers are, suppleness and productivity. Network printers are able to run in various operating system, which implies
multiple devices of different operating system is able to make use of the printer without a problem. Furthermore, printing through the internet
gives people diversity sorts of options when multiple network printers are connected to a server at the same time. [ CITATION Dan20 \l 2057 ]
FTP Server that stands for File Transfer Protocol Server, is a network server program which allows multiple different devices to
transfer files through a computer network. FTP server is a universal accepted code of conduct, which is established in around 1970s to provide a
platform to let two different mainframes to transmit digital information over the network server. One mainframe function in place of the host to
stock data and the additional protocols for the client to direct or apply data from the host. The FTP code of behaviour normally uses TCP port 21
as its go to method of communication. An FTP server host will pay attention for client networks on TCP port 21. [ CITATION wpa18 \l 2057 ]
Email Server also known as a mail server is a server system that is in charge to provide a platform for various email accounts to dispatch
and accepts email. Email servers uses universal electronic mail procedures protocols to dispatch and accepts email. When you gain access to an
email server via a webpage or electronic mail patron, these protocols, procedures process all the networks naturally in the background. For
instance, email server uses the SMTP protocol to dispatch emails and control departing email demands. Furthermore, Email servers make use of
POP3 and IMAP procedures in order to accept emails and are commonly used to progress received email. [ CITATION Tec15 \l 2057 ]
DHCP Server is a network system server that will creates, dispatch and allocate default gateways, IP addresses and various network
measurable factor to the individual devices that are config with dynamic host configuration protocol. As it depends on the protocol to properly
answer and response to transmission enquiries by users on the internet. Furthermore, DHCP server will allocate an exclusive dynamic IP address
to each client. However, it will change or disconnect if the use time for the IP address has run out of time. Without DHCP server, it will require
tons of job for the system or network administrator to assign a static IP address to each and every client that joins the networks [ CITATION Inf21 \l
2057 ].
CRM Server also known as customer relationship management server. It’s an integration strategy, data analysis program answers that
enhances how to interrelate and do business with potential customers for a company. CRM systems provides solutions to sort and preserve
relations with consumers, sales tracking, advertising, and data collection. By using CRM system, it provides growth to your company profits by
reorganization managerial procedures in sales, advertising, and help partitions, and gives you a peace of mind to concentrate on constructing and
preserves the client relationships that matters. [ CITATION Mic21 \l 2057 ]
HTTP Server also known as the web server and can be refer as either a software program or a hardware system, or two that cooperate
together. On the hardware part, a web server is a hardware device that contains internet server program and the webpage’s files. A network
server links to the cyberspace and wires physical information exchange with various devices linked to the network. On the software part, a web
server consists of numerous shares that regulate how network client entree the host documents. An HTTP server is a software system that
comprehends web addresses and the HTTP protocol that gateway customs to view websites. Furthermore, HTTP servers can be retrieved from the
domain names of the internet site, and it transports the information of these hosted webpage to the consumers systems.[ CITATION MDN21 \l 2057 ]
DNS Server also known as Domain Name System Server is server that allows clients link to webpages using the domain names of the
webpages instead of IP addresses. As we already know, each system that connected to the cyberspace has a rather special IP address that allow
other system to locate it. DNS servers provides a hostname to the system IP address. So instead of entering a complex alphanumerical IP
address, we are able to enter the hostname to access the webpage or system.[ CITATION CLo21 \l 2057 ]
In the part of wireless connection, we used WAP (Wireless Access Point) to ensure the connectivity of Wi-Fi connection. WAP its
function is to convert a wired network to a wireless network. Wireless AP is a coaxial communication between wireless network and wired
network. In places with high geographical locations, coverage can be increased. A wireless AP is a wireless switch, connected to a wired switch
or router, and the receiving wireless terminal belongs to the same subnet as the original network. The reason for choosing WAP is because a
company needs many wireless access nodes to achieve large-area network coverage. At the same time, all access terminals belong to the same
network, which also facilitates the company's network administrators to simply implement network control and management. This saves
customers time and management overhead because it can be automatically re-associated or re-verified.
In addition, from Figure 36 we used Wi-Fi Protected Access 2 (WPA2) to ensure the security of network while having wireless
connectivity. The security mechanism in Wi-Fi with WPA2 is an authentication form of the IEEE 802.11i standard verified by the Wi-Fi
Alliance. WPA2 implements the mandatory elements of 802.11i. In particular, the Michael algorithm is replaced by the recognized and
completely secure CCMP (Counter CBC-MAC Protocol) message authentication code, and RC4 is also replaced by AES (Advanced
Encryption Standard). We have set the pre-shared key (PSK) with at least 12 alphabets. Pre-shared key (PSK) is designed and used for the
family or small company network that cannot afford the cost and complexity of the 802.1X authentication server. Each user must enter the same
pre-configured key to access the network, and the key can be 8 to 63 ASCII (American Standard Code for Information Interchange)
characters, or 64 hexadecimal numbers (256 bits). The user can decide whether to store the key in the computer to save the trouble of typing
repeatedly, but the key must be pre-configured in the Wi-Fi router or WAP.
The function of VLSM is to borrow the corresponding number of digits from their host number to make the network number based on the
classified IP address. That will increase the number of digits of the network number and increase the length of the mask. (WELEKWE, 2020)
VLSM divides a large-scale IP network into multiple small-scale IP networks. Different departments of a certain unit or enterprise can
display different networks internally and display the same IP network externally. When it comes to VLSM, we have to mention the Subnet mask.
The mask is the same as the IP, with a 32-bit binary, used to perform operations with a certain IP to calculate the network number of the IP.
(WELEKWE, 2020)
For an example to find a network ID with IP address 21.31.233.69 and subnet mask 255.255.255.192.
Justification
XEN’s Design department currently has 11 employees. The /27 subnet supports 30 hosts.
There are 11 computers and 1 printer in the entire department network. Wireless access
points in the department allow employees to connect to their wireless devices. It has 17
hosts that can be added to cope with future expansion.
Broadcast 192.168.25.255
Justification
XEN’s Finance department currently has 11 employees. The /27 subnet supports 30 hosts.
There are 11 computers and 1 printer in the entire department network. Wireless access
points in the department allow employees to connect to their wireless devices. It has 17
hosts that can be added to cope with future expansion.
Broadcast 192.168.26.15
Justification
This Network is for VOIP service. Each department and some places like CEO room and
reception area contains an IP phone for intercontact. /28 subnet borrowing 4 bits will create
16 subnets, each subnet supports 14 hosts. In our consider the numbers of IP phone will not
increase so 14 host numbers are sufficient for VOIP services.
XEN’s Engineering department currently has 11 employees. The /27 subnet supports 30
hosts. There are 11 computers and 1 printer in the entire department network. Wireless
access points in the department allow employees to connect to their wireless devices. It has
17 hosts that can be added to cope with future expansion.
Broadcast 172.16.0.191
Justification
XEN's management department currently has 10 employees. The CEO and CTO network
connection are located in this department. /27 subnet supports 30 hosts. There are 11
computers and 1 printer in the entire departmental network. Wireless access points in the
department allow employees to connect to their wireless devices. It can add 16 hosts to
cope with future expansion.
Broadcast 172.16.0.255
Justification
This network is for XEN guests use their wireless devices to connect WIFI via wireless
access point. There is a computer with a static IP address in the reception area. /27 subnet
borrows 3 bits will create 8 subnets; each subnet supports 30 hosts. Therefore, it is
sufficient as for guest WIFI uses.
Broadcast 172.16.1.15
Justification
This Network is for VOIP service. Each department and some places like CEO room and
reception area contains an IP phone for intercontact. /28 subnet borrowing 4 bits will create
16 subnets, each subnet supports 14 hosts. In our consider the numbers of IP phone will not
increase so 14 host numbers are sufficient for VOIP services.
Justification:These devices (printer/gateway/server) should have a predictable static IP address for a constant connection. It makes the devices
will not be disconnected frequently. Therefore, these devices can be easily and continuously access by other end devices. Upon that, static IP
address is necessary for these devices.
connected to Wireless
Access Point
All PCs and Staff’s 192.168.25.70 –
VLAN 30 – IT Department wireless devices in the 192.168.25.94
department
All PCs and Staff’s 192.168.25.102 –
VLAN 40 – Order and Delivery Department wireless devices in the 192.168.25.126
department
All PCs and Staff’s 192.168.25.134 –
VLAN 50 – Design Department wireless devices in the 192.168.25.158
department
All PCs and Staff’s 192.168.25.166 –
VLAN 60 – Manufacture Department wireless devices in the 192.168.25.190
department
All PCs and Staff’s 192.168.25.198 –
VLAN 70 – Management Department wireless devices in the 192.168.25.222
department
All PCs and Staff’s 192.168.25.230 –
VLAN 80 – Finance Department wireless devices in the 192.168.25.254
department
Dynamic Addressing (SG)
All Staff’s wireless 172.16.0.11 –
VLAN 20 – Public Area devices connected to 172.16.0.62
Wireless Access Point
All PCs and Staff’s 172.16.0.70 –
VLAN 30 – Order and Delivery Department wireless devices in the 172.16.0.126
department
All PCs and Staff’s 172.16.0.134 –
VLAN 40 – Engineering Department wireless devices in the 172.16.0.158
department
All PCs and Staff’s 172.16.0.166 –
VLAN 50 – Management Department wireless devices in the 172.16.0.190
department
VLAN 60 –Research and Development All PCs and Staff’s 172.16.0.198 –
Department wireless devices in the 172.16.0.222
department
Reception Area PC 172.16.0.228 –
and all Guest’s 172.16.0.254
VLAN 70 – Guest Network wireless devices
connected to Wireless
Access Point
Justification: These devices (PC/smartphone/tablet) use DHCP (Dynamic Host Configuration Protocol) to dynamically assign IP addresses.
This is because these devices do not require a specific IP address, so DHCP is suitable for this situation. DHCP (Dynamic Host Configuration
Protocol) is a network protocol for local area networks. Generally, a range of IP addresses is controlled by the server, and computers in the
network can obtain an IP address and subnet mask when they connect. The main function of DHCP is to centrally manage and assign IP
addresses, so that devices in the network environment can obtain information about IP addresses, Gateway addresses, and DNS server addresses,
and improve the efficiency of address usage. In an IP network, DHCP guarantees that any IP address can only be used by one device at a time.
DHCP allows network administrators to monitor and assign IP addresses of central nodes. When the device moves to another location in the
network, it can automatically receive a new IP address. This scheme has good fault tolerance. Even in a network with a small number of
computers, DHCP is still useful, because a computer can be added to the local network with lesser impact.
The difference between a static IP address and a dynamic IP address is the lease time of the IP address on the device. A static IP address
is a fixed IP address. Once assigned on the device, the IP address will not be changed and assigned to other devices. On the other hand, when we
turn on a device and prepare to connect to the network, dynamic IP addresses will be automatically assigned, and these IP addresses are assigned
by the Internet Service Provider server. (Tech Differences, 2018)
Internet Protocol (IP) address is a unique digital identifier assigned to each device on the network when it connects to the network to
distinguish each connected device. It encrypts network records and host records of hosts and routers connected to the network. The IPv4 address
range is 32 bits, used for the source and destination addresses of IP network packets. The IP address is essentially not a host, but a network
interface. Therefore, if an operator is using 4 different devices to connect to the network, it must have four different IP addresses. (Tech
Differences, 2018)
As its name, a static IP address does not change in nature. It will only change after the Internet service provider (ISP) or network
administrator manually changes it. Therefore, it will usually be allocated to DNS servers, mail servers and other devices that require a fixed
address. When the host is configured with a static IP address, the process will include the static IP address assigned by the device and can
directly access the network. A static IP address can provide instant and constant access rights, but the overhead is negligible, because the
assigned IP address will never change. The advantage of using static IP is that it reduces the work of assigning addresses. Unlike dynamic IP,
dynamic IP generates extra work when assigned to devices. A fixed IP address allows users to access their devices from any device connected to
the network. (Tech Differences, 2018)
The dynamic IP address is generally configured on the device using the DHCP protocol. Its IP address will always change. Whenever a
user connects to the network, the dynamic IP address of his device changes and is not fixed. DHCP (Dynamic Host Configuration Protocol)
servers use this system to track and find IP address information associated with active network elements. DHCP is widely used in browsing the
Internet. When the user tries to connect to the Internet, DHCP will provide the user with a dynamic IP address, and when the user fills in the
URL in the address bar of the browser, DNS (domain name server) will map the domain name to the web page IP address and let the user have
the access to browse the page. (Tech Differences, 2018)
Short conclusion
When we compare static IP addresses and dynamic IP addresses, dynamic IP addresses are more reliable than static IP addresses because
it eliminates the time-consuming manual configuration process. Unlike a static IP, since it changes regularly, it is also less vulnerable to attacks.
(Tech Differences, 2018)
So, there is a question, why are people still using static IP address, instead of using dynamic IP address to increase the flexibility of their
IP address? This is because there are still several benefits and needs for using a Static IP address. For example, a DNS server needs to use Static
IP address in order to work properly. DNS servers use static IP addresses so that devices are able to connect to the server automatically as it
guarantees constancy, providing continuous network service. Else if the IP address change frequently, the user would have to frequently
resetting those DNS servers on the devices in order to connect to the internet. When we browse a website, we are required to type in the correct
address for the website. However, it is not the same in the internet server, data transmission uses IP addresses and destination addresses as the
source, not a website address. The role of DNS is to interpret website addresses into IP addresses in order to simplify user memory. Which is
why, in order to have a stable DNS records, Static IP address is used. (Tech Differences, 2018)
5. Recommendations
5.1 Security
Nowadays, there are numerous dangers on the Internet, for example, change or forswearing of a PC organization and information penetrating.
Organization security is a few strategies that incorporate both programming and equipment to forestall this sort of issues occur and ensure the
web functioning admirably. Organization Security is imperative to everybody, if you are a web client. We use web to move information, a
portion of this information are significant and certainty. For our networking project, I recommend adding the firewall to enhance our network
security and protect the network system. Firewall is a product or equipment to screens the approaching organization traffic and square the
unapproved access. Firewall can hinder the greater part of the malware away from PC. As the determination, network security is a significant
advance to forestall any conceivable danger to the organization.
5.3 Fibre
There are some potential issues, for example, changes of two building structure and support of the organization and equipment. As the
structure changes, the actual transmission medium must be change too. An answer for this issue is to utilize optic fibre. Optic fibre is delicate to
stretch, strain, temperature, and different elements to distinguish bizarre condition upon establishment. Besides, optic fibre is electronically
inactive and will have lower danger of short out. With respect to the organization, 2 routers were use, each building have a steady and quick web
association. The equipment issues can be set up with buying a bunch of equipment with same source.
All the things that we require to be alert of is that the actual item may meddle WLAN associations. We should likewise know about that
dividers, roofs and other huge articles can restrain the span of the remote sign. Indeed, even things like metal file organizers can influence the
WLAN's presentation. The best way to forestall this is to ascertain the situation of the equipment types.
Other than that, the equipment likewise represents a few issues that can influence WLAN's exhibition because of obsolete firmware and
having sufficiently not or too many passages. The choice of having various passageways that the organization need is exceptionally troublesome.
There is no strategy for this issue as the sort, number and arrangement of the WLAN's switch, regulators and passages will rely upon the
organization. The solitary technique is to have acceptable support on the durable goods.
6. Conclusion
As a summary, this assignment makes our group work as a team and solve many problems about the networking, IP addressing, floor
plan design and the cisco packet tracer together. Our group also help each other when the other group member is facing the problem in the
assignment. And our group learned how to respect each other idea because when discussing for the assignment every member will have different
idea to work in this assignment. We need to respect the other idea and sharing self-idea to complete the assignment as a team.
In this assignment, we used the networking knowledge that learn in the class to complete the assignment. We know that this is just the
basic of the networking. We hope that we can go into deeper for networking knowledge in the future. It is important to learn the networking as
IT student because it is common in our life. It will be a benefit of learning for the networking knowledge. As we have a good knowledge in
networking, we can protect our information and protect the data for ourselves. We must know that we are not only the one learning for
networking knowledge. There are a lot of hacker around the world. So, there is no longer absolute safety for our networking environment. It is
important to avoid the attack from the hacker by learning those knowledges.
At the end, there are still a lot of feature that we need to figure out in this module. This is just a beginning for us. It is normal to have
some defect in our first networking project. After completed this assignment we believe that this project can enhance our networking skill. And
also, we will enhance our networking skill and make it better.
7. References
365, M. D., 2021. What is CRM?. [Online]
Available at: https://dynamics.microsoft.com/en-us/crm/what-is-crm/
[Accessed 13 1 2021].
Academy., C. N., 2014. Cisco Networking Academy's Introduction to Routing Dynamically. [Online]
Available at: https://www.ciscopress.com/articles/article.asp?p=2180210&seqNum=5
[Accessed 8 1 2021].
Exchange, S., 2020. What's the difference between Serial DCE and Serial DTE link?. [Online]
Available at: https://networkengineering.stackexchange.com/questions/55017/whats-the-difference-between-serial-dce-and-serial-dte-link
[Accessed 14 1 2021].
Larkin, D., 2020. LOCAL VS NETWORK PRINTERS AND HOW YOUR BUSINESS CAN BENEFIT. [Online]
Available at: https://www.marconet.com/blog/local-vs-network-printers-and-how-your-business-can-benefit#:~:text=A%20network%20printer%20is
%20part,and%20assigned%20to%20a%20workgroup.
[Accessed 13 1 2021].
Introduction
- Objective
-Assumptions (number of hosts, rooms, labs, etc.)
Teh Yu Xiang Wong Hui Chuo Lee Zi Rock Li Bo Wen
XEN KL (1st floor) XEN KL (2nd XEN Singapore XEN Singapore
floor) (1st floor) (2nd floor)
CLO2: Work in team to justify the topology and IP addressing plan based on the network design
Group Assignment
Assessment Criteria
Marks Awarded
Digital Skills (60 marks) Weight Student 1 Student 2 Student 3 Student 4
Network Diagram 10
Configuration 10
Demonstration 10
Referencing 10
Topology Justification 10
IP Addressing Plan and
10
Justification
Documentation 10
Alternate Roles 5
Peer Evaluation 5
4. Li Bo Wen TP061330
on complete things that we thought is impossible at first. This assignment teaches us the importance of the correct mind set when facing tasks
and difficulties is crucial in determining our daily life and results.
Li Bo Wen TP061330
From this Assignment I have learned time the board is significant, we need to do a ton of exploration so we need to deal with our opportunity to
create the we can complete the task as expected. I discovered that the organization is brimming with danger, the organization security is essential
to ensure our information in the web and how could I do to ensure myself in the web. I additionally figured out how the directing work in the
web to choose the best way to move information.