Introduction To Network: Group Assignment
Introduction To Network: Group Assignment
Introduction to Network
Group Assignment
Student Name/TP:
Zhang Xu (TP048925)
Table of contents
1. Introduction
2. Floor Plan
3. Network Diagram
5. Operational Requirements
5.3 Routing
6. Transmission medium
6.1 Physical
6.2 Wireless
7. Reliability Issues
8. Security Issues
9. Sustainability Issues
10. Conclusion
11. References
1. Introduction
Objective
International Institute of Science and Technology (IIST) is one of the leading
education University in Malaysia. Currently, the Management of the University have
a new plan to set up another branch in Kampar, Perak. Our team received the order
from the school management for our team to design a network system for the newly
established branch school. According to the requirements of the school management,
the network of block A and block B are interconnected, and block C is an independent
LAN. The whole school is equipped with secured wireless network for mobile users
and all PCs and networking equipment are connected using wired connection since it
is more reliable. The networks of Buildings A and B are open to the public, and the
network of Building C is only used by employees and IT staff.
Scope
The CEO requires our team’s expertise to design network system. The first is to
start with design floor plan. We must understand, block C is an independent LAN, not
connected to block A and block B, but the block C also need to connected to the
internet. On the other hand, the LAN of the block C also needs security to ensure that
no other non-employees use it. The networks of block A and block B are connected by
routers as a public network. But not connected to the LAN of the block C. This means
we have to assign different LAN addresses and subnet masks to different blocks.
Different wireless networks set different security settings. In order for the wireless
network to cover the branch school, we need to enhance the coverage of the wireless
network. So we have to design network distribution, IP address allocation and
network security.
Assumptions
Different facilities have different uses, so their network settings are not the
same. Building A is for public use. It has three floors, including a reception hall, an
executive office, a waiting area and a cafeteria. Wi-Fi covers the A building, in
addition to the reception hall can be ADSL access to the network. The Office of
Administration has multiple ADSL interfaces that are independent of each other,
ensuring broadband speed. The waiting hall and restaurant mainly use Wi-Fi, which
saves resources and makes it convenient for students to use. These are the
assumptions for building A. Building B is also full Wi-Fi coverage. All digital
classrooms in building B will feature ADSL access. libraries, computers and research
labs offer several ADSL interfaces that teachers and students can easily use. Wi-fi
signals can be accepted in the examination room, but they can be blocked during the
test. In addition, the printing plant has one to two ADSL interfaces. The school's
auditorium, club, gymnasium and restaurant only offer Wi-Fi access. Building C has
two floors, which are located on the first floor of the teachers' room and the second
floor of the IT office and the school's server room. The first layer provides one or two
network interfaces. The IT office on the second floor has multiple network interfaces,
because the IT office must ensure the network speed. The server room includes fiber
modem and router, etc. While the server room is connected to the Internet, other
computers in the school cannot connect to the Internet without permission.
1. Floor Plan
Block A level1~3 Meeting Room
- Justification
We designed the floor plan of each floor of Building A, Building B and Building C
according to the requirements of the document. Because Building A and Building B
are connected, we designed a passage on the 1st floor to connect Building A and
Building B. There are a lot of traffic in Building A and Building B. We designed two
stairs and an elevator to facilitate students, teachers and visitors to the school to go to
the floor they want to go.
2. Network Diagram
(2) Details
On the far left is the network layout of Building A. Because Building A is a
completely public area, we decided to use only wireless devices instead of wired
networks. Use a router to connect to the LAN of the B building. The middle area
is the network design of Building B. Since Building B is mainly composed of
classrooms and offices, we have designed wired and wireless methods, and still
provide wireless devices for students and teachers. The far right is the network
design of Building C. Since the C building is a staff building, the network
environment needs to be next door and not connected to other networks. We
design an independent network and still provide wireless network to the faculty
and staff. Under the independent network, we don't have to worry about data
being transmitted to other networks. All routers use a manually assigned IP
address to form a network.
sw1(config)#int vlan 1
sw1(config-if)#ip add 192.168.1.2 255.255.255.0
sw1(config-if)#no sh
sw1(config-if)#ex
sw1(config)#ip default-gateway 192.168.1.1
sw2(config)#int vlan 1
sw2(config-if)#ip add 192.168.1.2 255.255.255.0
sw2(config-if)#no sh
sw2(config-if)#ex
sw2(config)#ip default-gateway 192.168.1.1
sw1#conf t
Enter configuration commands, one per line. End with CNTL/Z.
sw1(config)#vlan 2
sw1(config-vlan)#ex
sw1(config)#vlan 3
sw1(config-vlan)#ex
sw1(config)#int f0/4
Sw2#conf t
Sw2(config)#vlan 2
Sw2(config-vlan)#ex
Sw2(config)#vlan 3
Sw2(config-vlan)#ex
Sw2(config)#int f0/3
Sw2(config-if)#switchport mode access
Sw2(config-if)#switchport access vlan 2
Sw2(config-if)#int f0/4
Sw2(config-if)#switchport mode access
Sw2(config-if)#switchport access vlan 3
Sw2(config-if)#ex
sw1(config)#int f0/1
sw1(config-if)#switchport mode trunk
sw1(config-if)#no sh
r1#conf t
Enter configuration commands, one per line. End with CNTL/Z.
r1(config)#int f0/0
r1(config-if)#no shut
r1(config)#int f0/0.1
r1(config-subif)#encapsulation dot1Q 1
r1#enable
r1#conf t
r1(config)#ip dhcp excluded-address 192.168.2.1
r1(config)#ip dhcp pool vlan2
r1(dhcp-config)#net 192.168.2.0 255.255.255.0
r1(dhcp-config)#default-router 192.168.2.1
r1(dhcp-config)#dns-server 100.1.1.2
r1(config)#ip dhcp excluded-address 192.168.3.1
r1(config)#ip dhcp pool vlan3
r1(dhcp-config)#net 192.168.3.0 255.255.255.0
r1(dhcp-config)#dns-server 100.1.1.2
r1(dhcp-config)#ex
66. Router#
67. After you have completed the above work, continue to enter the following on the
router 0.
68. Input:Router#config
69. Configuring from terminal, memory, or network [terminal]?
70. Enter configuration commands, one per line. End with CNTL/Z.
71. Router(config)#ip dhcp pool dhcp1
72. Router(dhcp-config) #network 192.168.1.0 255.255.255.0
73. Router(dhcp-config) #defa
74. % Incomplete command.
75. Router(dhcp-config) #defa
76. Router(dhcp-config) #default-router 192.168.1.66
77. Router(dhcp-config) #exit
78. Router(config)#exit
79. Router#
80. %SYS-5-CONFIG_I: Configured from console by console
81.
82. Router#wr
83. Building configuration...
84. [OK]
85. Router#
86.
87. After you have completed the above work, continue to enter the following on the
router 1.
88. Input: Router#config
89. Configuring from terminal, memory, or network [terminal]?
90. Enter configuration commands, one per line. End with CNTL/Z.
91. Router(config)#ip dhcp pool dhcp1
92. Router(dhcp-config) #network 192.168.2.0 255.255.255.0
93. Router(dhcp-config) #defa
94. % Incomplete command.
95. Router(dhcp-config) #defa
96. Router(dhcp-config) #default-router 192.168.2.66
97. Router(dhcp-config) #exit
98. Router(config)#exit
99. Router#
100. %SYS-5-CONFIG_I: Configured from console by console
101.
102. Router#wr
103. Building configuration...
104. [OK]
105. Router#
As the main body of the LAN, the router is responsible for allocating IP addresses
to all devices connected to the LAN because only routers can set up a LAN and assign
IP addresses. The router is convenient to connect to the LAN in different areas of the
school, which is impossible for switches and wireless devices. The switch connects
dozens of computers in the same LAN. Only the switch can do it. We use the vlan
function of the switch to allocate ports to ensure that computers on the LAN can
obtain IP and connect to each other. To ensure that wireless networks are available
throughout the school, we also plan to add wireless devices and wireless antennas.
The wireless device transmits the wireless Wi-Fi network signal, and the wireless
antenna enhances the signal to ensure that the wireless network can be used
throughout the school. The wireless device also connects the switch to the router, and
the device connected to the wireless network obtains the IP address from the router.
For our network design diagram, we chose switches, routers and wireless devices to
form a LAN. The switch can provide exclusive electrical signal path for any two
network nodes of the access switch. A router is a device that connects to various local
area networks and wide area networks in the Internet. It automatically selects and sets
routes according to the channel conditions, and sends signals in order of optimal path.
The main difference between a route and a switch is that the switch occurs at the
second layer (data link layer) of the OSI reference model, and the route occurs at the
third layer, the network layer. This difference determines that routing and switches
need to use different control information in the process of moving information, so the
way they implement their respective functions is different. A wireless network is a
network implemented using wireless communication technology.
As the main body of the LAN, the router is responsible for allocating IP addresses
to all devices connected to the LAN because only routers can set up a LAN and assign
IP addresses. The router is convenient to connect to the LAN in different areas of the
school, which is impossible for switches and wireless devices. The switch connects
dozens of computers in the same LAN. Only the switch can do it. We use the vlan
function of the switch to allocate ports to ensure that computers on the LAN can
obtain IP and connect to each other. To ensure that wireless networks are available
throughout the school, we also plan to add wireless devices and wireless antennas.
The wireless device transmits the wireless Wi-Fi network signal, and the wireless
antenna enhances the signal to ensure that the wireless network can be used
throughout the school. The wireless device also connects the switch to the router, and
the device connected to the wireless network obtains the IP address from the router.
5.3 Routing
1) Probability
Routing is a process that determines the network scope of an end-to-end path
when grouping from source to destination. There are three types of routes: Static
routing, default routing, dynamic routing. Routing occurs in the third layer of the OSI
Network Reference Model, the network layer. Routing boot grouping is forwarded,
after some intermediate nodes, to their destination. If it is made into hardware, it is
called a router. Routing is typically guided by routing tables--a table that stores the
best path to each destination--to guide packet forwarding. Therefore, in order to
effectively transfer grouping, it is important to create a routing table that is stored in
router memory.
Figure 1(google.2019)
2) Routing table
In a computer network, a routing table is a spreadsheet (file) or class database
that is stored on a router or networked computer. The routing table stores a path to a
specific network address (in some cases, routing measures with paths are also logged).
Figure 2(baidu.2019)
In addition, the routing table contains topology information around the
network. The main goal of routing table establishment is to realize routing protocol
and Static routing.
The routing table is not directly involved in the transmission of packets. For
example, a routing table, like the one we normally use, identifies various routes, and
the routing table holds the logo information for the subnet, the number of routers on
the network, and the name of the next router. Routing tables can be set by the system
administrator fixed, can also be dynamically modified by the system, can be
automatically adjusted by the router, or can be controlled by the host. It can be
divided into static routing tables and dynamic routing tables. The fixed routing table,
which is set up by the system administrator in advance, is called a static routing table,
which is usually preset according to the configuration of the network when the system
is installed, and it will not change with the change of the network structure in the
future. A dynamic routing table is a routing table that is automatically adjusted by the
router based on the operation of the network system. The router automatically learns
and remembers network operation according to the functions provided by the routing
protocol, and automatically calculates the best path of data transfer when needed. The
contents of the table items in the routing table include: Destination address, network
mask, identification of the priority of routing to join the IP routing table, output
interface and nex-thop.
3) Routing protocol
We all have certain rules for doing things, and routers are the same, and they
have established rules. A routing protocol is an online protocol that specifies how
packets are forwarded. Routing protocols support routable protocols by sharing
routing information between routers. Routing protocols work with routers to perform
routing and packet forwarding functions. Routing protocol mainly runs on the router,
the routing protocol is used to determine the arrival path, it includes RIP, IGRP,
EIGRP, OSPF, IS-IS, BGP and so on. RIP, which has long been used on the Internet,
is the simplest routing protocol. It mainly maintains the position relationship of
adjacent routers and calculates its own routing table information according to the
routing table information received. The OSPF and IS-IS protocol belongs to the link
state routing protocol. The biggest feature of IGRP is the use of mixed measures,
considering the link's bandwidth, latency, load, MTU, reliability 5 aspects to calculate
the measure of the route. EIGRP is an enhanced internal Gateway routing protocol.
BGP belongs to the Boundary Gateway Protocol.
Figure 3 (google.2019)
By adhering to specific rules, the network can work properly. The rules about
routing protocols are described above.
4) Type of router
Access router refers to the router device that accesses LAN users to the wide
area network. Enterprise-class routers are used to connect thousands of computers
within large enterprises and are not accessible to ordinary LAN users. Compared with
the access router, the enterprise router supports many network protocols and is fast
and must handle various LAN types to support a variety of protocols. This
combination of routers, mostly large enterprises, schools and other use. A small
number of department technicians can access the backbone router. The internet is
composed of dozens of backbone networks, each backbone network services
thousands of small networks, backbone routers to achieve enterprise-class network
interconnection. The first thing it requires to consider is its fast reliability.
In addition to the above, there are soft and hard routing. Soft routing refers to
the use of desktop or server with software to form a routing solution, mainly by the
software settings, to achieve the function of the router. Soft routing mainly relies on
software to realize routing function. Hard routing is a special use of hard equipment,
including processors, power supply, embedded software, to provide set router
functionality. Routing is important for a network.
email function will be saved in the server regardless of whether it is used or not.
a) Twisted-pair wire
Twisted-Pair wire is a universal wiring made of two insulated wires that are
entangled with each other according to certain specifications (usually
b) Coaxial cable
Coaxial cable refers to a cable with two concentric conductors, while the
conductor and shielding layer share the same axis. The coaxial cable is divided into
four layers from the center: The Central copper wire, the plastic insulator, the mesh
conductive layer and the wire skin. Coaxial cables transmit alternating current rather
than DC, meaning that there are several times in the direction in which the currents
are reversed every second. Coaxial cables are divided into fine cables: RG-58 and
coarse cables RG-11 two kinds.
c) Optical fiber
Optical fiber is a kind of fiber made of glass or plastic, which can be used as a
light conduction tool. The transmission principle is "total reflection of light".
From the above analysis you can know: The twisted-pair wire is in the
transmission distance, Channel width and data transmission speed and other aspects
are subject to certain restrictions; The large size of coaxial cable, Unable to withstand
entanglement, pressure and severe bending, and the cost is high. The advantages of
optical fibers are what they don't have. We give priority to fiber optics when choosing.
3. Wireless transmission
Wireless transmission refers to a way of data transmission using wireless
technology. With the development of wireless technology, the application of wireless
transmission technology is more and more accepted by all walks of life. Wireless
transmission is divided into: analog microwave transmission and digital microwave
transmission. I'll introduce them below.
a) Analog Microwave Transmission
Wireless microwave transmission is like light linear transmission, which is a
kind of relay transmission in the range of over-the-horizon. Analog microwave
transmission is the direct modulation of video signal on the microwave channel
through the antenna emission, monitoring center through the antenna to receive
microwave signal, and then through the microwave receiver to solve the original
video signal. Advantages: This way the image is very clear, no delay, no compression
loss, cheap cost, construction installation and commissioning are simple.
Disadvantages: Poor anti-jamming ability, easy to be affected by the weather and
surrounding environment, transmission distance is limited.
Reliability is the most important indicator of each project, it represents the time
when the project can work without problems. The higher the reliability of a project,
the longer it can run without problems. The fact that a product can work without
trouble for a long time is exactly what all consumers need. Every electronic product in
the mall will be marked: it can work for a long time, which shows that reliability is
now a standard for customers to judge whether a product is good or not. In particular,
the network we designed is for schools, because it takes a long time to work, so
reliability must be high.
We designed the network layout to work without trouble for a long time, but in
order to ensure the hardware life, we recommend regular maintenance, close some
network hardware at night, keep the database server. We will do a good job of backing
up the database. If the database is lost due to a failure, the previously backed up
database can be directly restored. The network layout we designed is also very
maintainable, with only one body component, and it is easy to find the root cause of
troubleshooting. If the network we design is easy to fail, we will choose to design a
more conservative network layout to ensure high reliability.
Network security refers to the network system hardware, software and its
system data are protected, not for accidental or malicious reasons to be damaged,
changed, leaked, the system is continuously reliable and normal operation, network
services are not interrupted. The influencing factors of network security include:
natural disasters, accidents, ComputerCrime, Human behavior, such as improper use,
poor safety awareness, etc. Therefore, ensuring network security is critical.
1) First, the physical security of the network is the premise of the security of
the whole network system. Because the network system belongs to the weak power
project, the pressure resistance value is very low. Therefore, in the design of network
engineering, it is necessary to give priority to protecting protected persons and
network equipment from electricity, fire and lightning strikes. At the same time,
consider the distance between the wiring system and the lighting wires, power wires,
communication lines, heating pipes and hot and cold air pipes to ensure that they do
not affect each other. In addition, lightning protection systems must be built, and
lightning protection systems should consider the lightning protection of computers
and other weak and pressure-resistant equipment. You can also do some protection on
your computer's hardware, etc., to back up your data. In general, physical security is
mainly natural disasters and some accidents. You can also use more removable
devices, which can also reduce losses. At the same time, we should try to avoid the
physical security risks of the network.
information safe. Do not browse unsafe websites to ensure that your computer is not
threatened by Trojan viruses.
Encrypt your own information, accounts, change passwords frequently, and maintain
your computer. All these methods can help you keep your network safe.
10.0 Conclusion
As a result of the efforts of our group, we have put an end to this task. It may
not be the best, but we all try to do it well. In addition, we have learned more about
the network. The emergence of the network has promoted the exchange and
development of the world. But there's a good side to that and there's going to be a bad
side. Find the right positioning, rational use of network technology for the benefit of
mankind. Nowadays, the Internet has become an indispensable part of our life. How
to use it correctly is worthy of our consideration. At the same time, in the process we
also know that we still have a lot of shortcomings. We will also learn lessons and try
to make up for our shortcomings.
References
GeeksforGeeks (2018), Computer Network | Types of routing. [Online] Available
at: https://www.geeksforgeeks.org/computer-network-types-routing/
January 2019].
January 2019].
Bozicevic, V. (2018). Cloud Computing Benefits: 7 Key Advantages for Your Business -
GlobalDots Blog. [online] GlobalDots - CDN, Security and Performance Solutions. Available
Sharma, S. (2017). What is a software server and what are the main differences
between a software server and a hardware server?. [online] Quora. Available at:
https://www.quora.com/What-is-a-software-server-and-what-are-the-main-
differences-between-a-software-server-and-a-hardware-server [Accessed 27 Jan.
2019].
Shekhar, A. (2016). Different Networking Devices And Hardware Types — Hub,
Switch, Router, Modem, Bridge, Repeater. [online] Fossbytes. Available at:
https://fossbytes.com/networking-devices-and-hardware-types/ [Accessed 28 Jan.
2019].
Cope, S. (2019). Basic Home Network And Internet Components, Devices and