0% found this document useful (0 votes)
275 views42 pages

Introduction To Network: Group Assignment

The document provides details for designing a network for a new branch of International Institute of Science and Technology (IIST). It includes floor plans for 3 blocks (A, B and C), with Block C having an independent LAN. It also includes a network diagram connecting Blocks A and B via routers, while keeping Block C separate. Configuration details are provided for routers and switches to implement the designed network with VLANs, IP addresses, default gateways and trunk/access ports.

Uploaded by

Rabindra Dhakal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
275 views42 pages

Introduction To Network: Group Assignment

The document provides details for designing a network for a new branch of International Institute of Science and Technology (IIST). It includes floor plans for 3 blocks (A, B and C), with Block C having an independent LAN. It also includes a network diagram connecting Blocks A and B via routers, while keeping Block C separate. Configuration details are provided for routers and switches to implement the designed network with VLANs, IP addresses, default gateways and trunk/access ports.

Uploaded by

Rabindra Dhakal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 42

CT043-3-1 Introduction to Network

Introduction to Network

Group Assignment

Model Title/Code: Introduction to Network/CT043-3-1-IN

Lecturer Name: QUSAY SABAH ISHAQ

Hand Out Date: 29 October 2018

Hand in Date: 28 January 2019

Student Name/TP:

Chen Zhao Ye (TP048898)

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

Zhang Xu (TP048925)

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

Table of contents

1. Introduction

2. Floor Plan

3. Network Diagram

4. IP addressing & subnetting play

5. Operational Requirements

5.1 Hardware (Network Devices)

5.2 Software (Servers)

5.3 Routing

5.4 Cloud Services

6. Transmission medium

6.1 Physical

6.2 Wireless

7. Reliability Issues

8. Security Issues

9. Sustainability Issues

10. Conclusion

11. References

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

12. Work Breakdown Structure

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

1. Introduction

Objective
International Institute of Science and Technology (IIST) is one of the leading
education University in Malaysia. Currently, the Management of the University have
a new plan to set up another branch in Kampar, Perak. Our team received the order
from the school management for our team to design a network system for the newly
established branch school. According to the requirements of the school management,
the network of block A and block B are interconnected, and block C is an independent
LAN. The whole school is equipped with secured wireless network for mobile users
and all PCs and networking equipment are connected using wired connection since it
is more reliable. The networks of Buildings A and B are open to the public, and the
network of Building C is only used by employees and IT staff.

Scope
The CEO requires our team’s expertise to design network system. The first is to
start with design floor plan. We must understand, block C is an independent LAN, not
connected to block A and block B, but the block C also need to connected to the
internet. On the other hand, the LAN of the block C also needs security to ensure that
no other non-employees use it. The networks of block A and block B are connected by
routers as a public network. But not connected to the LAN of the block C. This means
we have to assign different LAN addresses and subnet masks to different blocks.
Different wireless networks set different security settings. In order for the wireless
network to cover the branch school, we need to enhance the coverage of the wireless
network. So we have to design network distribution, IP address allocation and
network security.

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

Assumptions
Different facilities have different uses, so their network settings are not the
same. Building A is for public use. It has three floors, including a reception hall, an
executive office, a waiting area and a cafeteria. Wi-Fi covers the A building, in
addition to the reception hall can be ADSL access to the network. The Office of
Administration has multiple ADSL interfaces that are independent of each other,
ensuring broadband speed. The waiting hall and restaurant mainly use Wi-Fi, which
saves resources and makes it convenient for students to use. These are the
assumptions for building A. Building B is also full Wi-Fi coverage. All digital
classrooms in building B will feature ADSL access. libraries, computers and research
labs offer several ADSL interfaces that teachers and students can easily use. Wi-fi
signals can be accepted in the examination room, but they can be blocked during the
test. In addition, the printing plant has one to two ADSL interfaces. The school's
auditorium, club, gymnasium and restaurant only offer Wi-Fi access. Building C has
two floors, which are located on the first floor of the teachers' room and the second
floor of the IT office and the school's server room. The first layer provides one or two
network interfaces. The IT office on the second floor has multiple network interfaces,
because the IT office must ensure the network speed. The server room includes fiber
modem and router, etc. While the server room is connected to the Internet, other
computers in the school cannot connect to the Internet without permission.

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

1. Floor Plan
Block A level1~3 Meeting Room

Block A level4 administration office and waiting area

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

Block A level6 cafeteria

Block B level 1 meeting room

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

Block b leve2 library

Block B level3 digital classrooms

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

Block B level4 Computing and research labs

Block B level5 cafeteria

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

Block B level6 printing shop, student’s club, sports facilities (gym)

Block C level1 faculty’s room

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

Block C level 2 IT office department and server room

- Justification
We designed the floor plan of each floor of Building A, Building B and Building C
according to the requirements of the document. Because Building A and Building B
are connected, we designed a passage on the 1st floor to connect Building A and
Building B. There are a lot of traffic in Building A and Building B. We designed two
stairs and an elevator to facilitate students, teachers and visitors to the school to go to
the floor they want to go.

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

2. Network Diagram

(1) Network Design

(2) Details
On the far left is the network layout of Building A. Because Building A is a
completely public area, we decided to use only wireless devices instead of wired
networks. Use a router to connect to the LAN of the B building. The middle area
is the network design of Building B. Since Building B is mainly composed of
classrooms and offices, we have designed wired and wireless methods, and still
provide wireless devices for students and teachers. The far right is the network
design of Building C. Since the C building is a staff building, the network
environment needs to be next door and not connected to other networks. We
design an independent network and still provide wireless network to the faculty
and staff. Under the independent network, we don't have to worry about data
being transmitted to other networks. All routers use a manually assigned IP
address to form a network.

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

(3) Packet Tracer Configuration


For Block B:
r1(config)#int f0/0
r1(config-if)#no sh
r1(config)#lin vty 0 4
r1(config-line)#login local
r1(config-line)#username admin password cisco
r1(config-line)#exit
r1(config)#enable secret cisco
r1(config)#service password-encrption

sw1(config)#int vlan 1
sw1(config-if)#ip add 192.168.1.2 255.255.255.0
sw1(config-if)#no sh
sw1(config-if)#ex
sw1(config)#ip default-gateway 192.168.1.1

sw2(config)#int vlan 1
sw2(config-if)#ip add 192.168.1.2 255.255.255.0
sw2(config-if)#no sh
sw2(config-if)#ex
sw2(config)#ip default-gateway 192.168.1.1

sw1#conf t
Enter configuration commands, one per line. End with CNTL/Z.
sw1(config)#vlan 2
sw1(config-vlan)#ex
sw1(config)#vlan 3
sw1(config-vlan)#ex
sw1(config)#int f0/4

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

sw1(config-if)#switchport mode access


sw1(config-if)#switchport access vlan 2
sw1(config-if)#int f0/5
sw1(config-if)#switchport mode access
sw1(config-if)#switchport access vlan 3
sw1(config-if)#ex

Sw2#conf t
Sw2(config)#vlan 2
Sw2(config-vlan)#ex
Sw2(config)#vlan 3
Sw2(config-vlan)#ex
Sw2(config)#int f0/3
Sw2(config-if)#switchport mode access
Sw2(config-if)#switchport access vlan 2
Sw2(config-if)#int f0/4
Sw2(config-if)#switchport mode access
Sw2(config-if)#switchport access vlan 3
Sw2(config-if)#ex

sw1(config)#int f0/1
sw1(config-if)#switchport mode trunk
sw1(config-if)#no sh

r1#conf t
Enter configuration commands, one per line. End with CNTL/Z.
r1(config)#int f0/0
r1(config-if)#no shut
r1(config)#int f0/0.1
r1(config-subif)#encapsulation dot1Q 1

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

r1(config-subif)#ip add 192.168.1.1 255.255.255.0


r1(config-subif)#ex
r1(config)#int f0/0.2
r1(config-subif)#encapsulation dot1Q 2
r1(config-subif)#ip add 192.168.2.1 255.255.255.0
r1(config-subif)#ex
r1(config)#int f0/0.3
r1(config-subif)#encapsulation dot1Q 3
r1(config-subif)#ip add 192.168.3.1 255.255.255.0
r1(config-subif)#no sh
r1(config-subif)#ex

r1#enable
r1#conf t
r1(config)#ip dhcp excluded-address 192.168.2.1
r1(config)#ip dhcp pool vlan2
r1(dhcp-config)#net 192.168.2.0 255.255.255.0
r1(dhcp-config)#default-router 192.168.2.1
r1(dhcp-config)#dns-server 100.1.1.2
r1(config)#ip dhcp excluded-address 192.168.3.1
r1(config)#ip dhcp pool vlan3
r1(dhcp-config)#net 192.168.3.0 255.255.255.0
r1(dhcp-config)#dns-server 100.1.1.2
r1(dhcp-config)#ex

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

3. IP addressing & subnetting plan


I designed it. IP Address and subnet plan, consisting of two routers, two
switches, and six PCs. Each router has two different ports. Two routers are
connected to each other, and another port of the router is connected to the switch.
The switch then assigns the IP address to the computer.

4. In building router 0, we can do the following things.


5. Input: Router>en
6. Router#config ter
7. Enter configuration commands, one per line. End with CNTL/Z.
8. Router(config)#interface fast
9. Router(config)#interface fastEthernet 0/0
10. Router(config-if) #ip add
11. % Incomplete command.
12. Router(config-if) #ip address 66.0.0.1 255.0.0.0
13. Router(config-if) #no shutdown
14. Router(config-if) #
15. Router(config-if) #exit
16. Router(config)#int
17. % Incomplete command.
18. Router(config)#interface fast
19. Router(config)#interface fastEthernet 0/1
20. Router(config-if) #ip add
21. % Incomplete command.
22. Router(config-if) #ip address 192.168.1.66 255.255.255.0

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

23. Router(config-if) #no shutdown


24. Router(config-if) #exit
25. Router(config)#exit
26. Router#
27. %SYS-5-CONFIG_I: Configured from console by console
28.
29. Router#show ip interface brief
30. Interface IP-Address OK? Method Status Protocol
31. FastEthernet0/0 66.0.0.1 YES manual up
32. FastEthernet0/1 192.168.1.66 YES manual up up
33. Vlan1 unassigned YES unset administratively down down
34. Router#
35.
36. When building routers1, we can do the following.
37. Input:Router>en
38. Router#config ter
39. Enter configuration commands, one per line. End with CNTL/Z.
40. Router(config)#interface fast
41. Router(config)#interface fastEthernet 0/0
42. Router(config-if) #ip add
43. % Incomplete command.
44. Router(config-if) #ip address 66.0.0.2 255.0.0.0
45. Router(config-if) #no shutdown
46. Router(config-if) #
47. Router(config-if) #exit
48. Router(config)#int
49. % Incomplete command.
50. Router(config)#interface fast
51. Router(config)#interface fastEthernet 0/1
52. Router(config-if) #ip add
53. % Incomplete command.
54. Router(config-if) #ip address 192.168.2.66 255.255.255.0
55. Router(config-if) #no shutdown
56. Router(config-if) #exit
57. Router(config)#exit
58. Router#
59. %SYS-5-CONFIG_I: Configured from console by console
60.
61. Router#show ip interface brief
62. Interface IP-Address OK? Method Status Protocol
63. FastEthernet0/0 66.0.0.1 YES manual up up
64. FastEthernet0/1 192.168.1.66 YES manual up up
65. Vlan1 unassigned YES unset administratively down down

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

66. Router#
67. After you have completed the above work, continue to enter the following on the
router 0.
68. Input:Router#config
69. Configuring from terminal, memory, or network [terminal]?
70. Enter configuration commands, one per line. End with CNTL/Z.
71. Router(config)#ip dhcp pool dhcp1
72. Router(dhcp-config) #network 192.168.1.0 255.255.255.0
73. Router(dhcp-config) #defa
74. % Incomplete command.
75. Router(dhcp-config) #defa
76. Router(dhcp-config) #default-router 192.168.1.66
77. Router(dhcp-config) #exit
78. Router(config)#exit
79. Router#
80. %SYS-5-CONFIG_I: Configured from console by console
81.
82. Router#wr
83. Building configuration...
84. [OK]
85. Router#
86.
87. After you have completed the above work, continue to enter the following on the
router 1.
88. Input: Router#config
89. Configuring from terminal, memory, or network [terminal]?
90. Enter configuration commands, one per line. End with CNTL/Z.
91. Router(config)#ip dhcp pool dhcp1
92. Router(dhcp-config) #network 192.168.2.0 255.255.255.0
93. Router(dhcp-config) #defa
94. % Incomplete command.
95. Router(dhcp-config) #defa
96. Router(dhcp-config) #default-router 192.168.2.66
97. Router(dhcp-config) #exit
98. Router(config)#exit
99. Router#
100. %SYS-5-CONFIG_I: Configured from console by console
101.
102. Router#wr
103. Building configuration...
104. [OK]
105. Router#

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

106. The configuration is finally completed.

5.0 Operational Requirements


5.1 Hardware (Network Devices)
For our network design diagram, we chose switches, routers and wireless
devices to form a LAN. The switch can provide exclusive electrical signal path for
any two network nodes of the access switch. A router is a device that connects to
various local area networks and wide area networks in the Internet. It automatically
selects and sets routes according to the channel conditions, and sends signals in order
of optimal path. The main difference between a route and a switch is that the switch
occurs at the second layer (data link layer) of the OSI reference model, and the route
occurs at the third layer, the network layer. This difference determines that routing and
switches need to use different control information in the process of moving
information, so the way they implement their respective functions is different. A
wireless network is a network implemented using wireless communication
technology.

As the main body of the LAN, the router is responsible for allocating IP addresses
to all devices connected to the LAN because only routers can set up a LAN and assign
IP addresses. The router is convenient to connect to the LAN in different areas of the
school, which is impossible for switches and wireless devices. The switch connects
dozens of computers in the same LAN. Only the switch can do it. We use the vlan
function of the switch to allocate ports to ensure that computers on the LAN can
obtain IP and connect to each other. To ensure that wireless networks are available
throughout the school, we also plan to add wireless devices and wireless antennas.
The wireless device transmits the wireless Wi-Fi network signal, and the wireless
antenna enhances the signal to ensure that the wireless network can be used
throughout the school. The wireless device also connects the switch to the router, and
the device connected to the wireless network obtains the IP address from the router.

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

5.2 Software (Servers)

For our network design diagram, we chose switches, routers and wireless devices to
form a LAN. The switch can provide exclusive electrical signal path for any two
network nodes of the access switch. A router is a device that connects to various local
area networks and wide area networks in the Internet. It automatically selects and sets
routes according to the channel conditions, and sends signals in order of optimal path.
The main difference between a route and a switch is that the switch occurs at the
second layer (data link layer) of the OSI reference model, and the route occurs at the
third layer, the network layer. This difference determines that routing and switches
need to use different control information in the process of moving information, so the
way they implement their respective functions is different. A wireless network is a
network implemented using wireless communication technology.

As the main body of the LAN, the router is responsible for allocating IP addresses
to all devices connected to the LAN because only routers can set up a LAN and assign
IP addresses. The router is convenient to connect to the LAN in different areas of the
school, which is impossible for switches and wireless devices. The switch connects
dozens of computers in the same LAN. Only the switch can do it. We use the vlan
function of the switch to allocate ports to ensure that computers on the LAN can
obtain IP and connect to each other. To ensure that wireless networks are available
throughout the school, we also plan to add wireless devices and wireless antennas.
The wireless device transmits the wireless Wi-Fi network signal, and the wireless
antenna enhances the signal to ensure that the wireless network can be used
throughout the school. The wireless device also connects the switch to the router, and
the device connected to the wireless network obtains the IP address from the router.

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

5.3 Routing

1) Probability
Routing is a process that determines the network scope of an end-to-end path
when grouping from source to destination. There are three types of routes: Static
routing, default routing, dynamic routing. Routing occurs in the third layer of the OSI
Network Reference Model, the network layer. Routing boot grouping is forwarded,
after some intermediate nodes, to their destination. If it is made into hardware, it is
called a router. Routing is typically guided by routing tables--a table that stores the
best path to each destination--to guide packet forwarding. Therefore, in order to
effectively transfer grouping, it is important to create a routing table that is stored in
router memory.

Figure 1(google.2019)
2) Routing table
In a computer network, a routing table is a spreadsheet (file) or class database
that is stored on a router or networked computer. The routing table stores a path to a
specific network address (in some cases, routing measures with paths are also logged).

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

Figure 2(baidu.2019)
In addition, the routing table contains topology information around the
network. The main goal of routing table establishment is to realize routing protocol
and Static routing.
The routing table is not directly involved in the transmission of packets. For
example, a routing table, like the one we normally use, identifies various routes, and
the routing table holds the logo information for the subnet, the number of routers on
the network, and the name of the next router. Routing tables can be set by the system
administrator fixed, can also be dynamically modified by the system, can be
automatically adjusted by the router, or can be controlled by the host. It can be
divided into static routing tables and dynamic routing tables. The fixed routing table,
which is set up by the system administrator in advance, is called a static routing table,
which is usually preset according to the configuration of the network when the system
is installed, and it will not change with the change of the network structure in the
future. A dynamic routing table is a routing table that is automatically adjusted by the
router based on the operation of the network system. The router automatically learns
and remembers network operation according to the functions provided by the routing
protocol, and automatically calculates the best path of data transfer when needed. The
contents of the table items in the routing table include: Destination address, network
mask, identification of the priority of routing to join the IP routing table, output
interface and nex-thop.
3) Routing protocol

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

We all have certain rules for doing things, and routers are the same, and they
have established rules. A routing protocol is an online protocol that specifies how
packets are forwarded. Routing protocols support routable protocols by sharing
routing information between routers. Routing protocols work with routers to perform
routing and packet forwarding functions. Routing protocol mainly runs on the router,
the routing protocol is used to determine the arrival path, it includes RIP, IGRP,
EIGRP, OSPF, IS-IS, BGP and so on. RIP, which has long been used on the Internet,
is the simplest routing protocol. It mainly maintains the position relationship of
adjacent routers and calculates its own routing table information according to the
routing table information received. The OSPF and IS-IS protocol belongs to the link
state routing protocol. The biggest feature of IGRP is the use of mixed measures,
considering the link's bandwidth, latency, load, MTU, reliability 5 aspects to calculate
the measure of the route. EIGRP is an enhanced internal Gateway routing protocol.
BGP belongs to the Boundary Gateway Protocol.

Figure 3 (google.2019)
By adhering to specific rules, the network can work properly. The rules about
routing protocols are described above.

4) Type of router
Access router refers to the router device that accesses LAN users to the wide
area network. Enterprise-class routers are used to connect thousands of computers

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

within large enterprises and are not accessible to ordinary LAN users. Compared with
the access router, the enterprise router supports many network protocols and is fast
and must handle various LAN types to support a variety of protocols. This
combination of routers, mostly large enterprises, schools and other use. A small
number of department technicians can access the backbone router. The internet is
composed of dozens of backbone networks, each backbone network services
thousands of small networks, backbone routers to achieve enterprise-class network
interconnection. The first thing it requires to consider is its fast reliability.
In addition to the above, there are soft and hard routing. Soft routing refers to
the use of desktop or server with software to form a routing solution, mainly by the
software settings, to achieve the function of the router. Soft routing mainly relies on
software to realize routing function. Hard routing is a special use of hard equipment,
including processors, power supply, embedded software, to provide set router
functionality. Routing is important for a network.

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

5.4 Cloud Services

Cloud Computing The addition, use, and interaction of Internet-based related


services typically involves providing dynamically scalable and often virtualized
resources over the Internet. Cloud is a metaphor for the Internet and the Internet.
Cloud computing can generally be divided into three categories: infrastructure as a
service (IaaS), platform as a service (PaaS), and software as a service (SaaS). As a
platform and place for storing, managing and processing data using a remote server
network hosted on the Internet, cloud computing is the future direction of enterprise
development, and it will change the way business operates. We chose SaaS as the
school's cloud service because SaaS is a mode of providing software through the
Internet. Vendors deploy application software on their own servers. Customers can
order the required application software services from the Internet according to their
actual needs. How much and how long the service is ordered? Pay the vendor and get
the service provided by the vendor via the Internet. Users no longer need to purchase
software, but instead use web-based software to rent providers to manage business
activities without the need to maintain software. Service providers have full authority
to manage and maintain software, while software vendors provide Internet
applications to customers. It also provides offline operation of software and local data
storage, allowing users to use their ordered software and services anytime, anywhere.
Schools need to use their own email and online storage space. SaaS is the best choice.
We decided to use a web server to build a cloud service because the web service is
easy to operate and can be accessed and used without additional installation of the
application. We set the account function for the web server. Different account types
have different operation rights. For example, the teacher account can upload files,
update the attendance rate, etc., the student account can download files and view data,
etc. We also set up the email function for the web server. Teachers and students are
free to choose whether or not to use this email function. The address generated by this

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

email function will be saved in the server regardless of whether it is used or not.

6.0 Transmission medium


1.Introduced
Network transmission medium refers to the carrier of transmitting information
in the network, and the commonly used transmission medium is divided into two
categories, wired transmission medium and wireless transmission medium. The
characteristics of different transmission media also vary, and their different
characteristics have a great influence on the quality of data communication and the
speed of communication in the network.

2.Wired Transmission Media

Figure 1(Wired Transmission Media.2019)


Wired transmission Media is the physical connection part implemented
between two communication devices, which transmits signals from one side to the
other. Wired transmission media mainly have twisted-pair wire, coaxial cable and
optical fiber. Twisted-pair and coaxial cables transmit electrical signals and optical
fibers transmit optical signals.

a) Twisted-pair wire
Twisted-Pair wire is a universal wiring made of two insulated wires that are
entangled with each other according to certain specifications (usually

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

counterclockwise) and belong to the transmission medium of information


communication network. Twisted-pair wires are divided into shielded twisted-pair and
unshielded twisted-pair wires.

Figure 2(twisted-pair wires.2019)

The outer layer of the shielded twisted-pair cable is wrapped in aluminum


platinum to reduce radiation, but it does not eliminate radiation, the price of shielded
twisted pair is relatively high, and it is more difficult to install than unshielded
twisted-pair cable. Unshielded twisted-pair is a data transmission line, composed of
four pairs of transmission lines of different colors, widely used in Ethernet roads and
telephone lines. Unshielded twisted-Pair wire has the following advantages;
unshielded jacket, small diameter, saving space, low cost; light weight, easy to bend,
easy to install; minimize or eliminate crosstalk; flame retardant; independent and
flexible, suitable for structured integrated wiring. Therefore, in the integrated wiring
system, unshielded twisted-pair wires have been widely used. Compared with other
transmission media, twisted-pair wires are limited in transmission distance, channel
width and data transmission speed, but the price is relatively low.

b) Coaxial cable
Coaxial cable refers to a cable with two concentric conductors, while the
conductor and shielding layer share the same axis. The coaxial cable is divided into
four layers from the center: The Central copper wire, the plastic insulator, the mesh
conductive layer and the wire skin. Coaxial cables transmit alternating current rather

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

than DC, meaning that there are several times in the direction in which the currents
are reversed every second. Coaxial cables are divided into fine cables: RG-58 and
coarse cables RG-11 two kinds.

Figure 3(Coaxial cables.2019)


Coaxial cables have the advantage of supporting high-bandwidth
communication on relatively long lines without repeaters. The disadvantages of
coaxial cables are also obvious: one is large, to occupy a large amount of space in the
cable pipeline, and the other is not to withstand entanglement, pressure and severe
bending, which will damage the cable structure, prevent the transmission of signals,
and finally the cost is high. It is mainly used in equipment bracket wiring, closed-
circuit television, shared antenna system, as well as color or monochrome RF monitor
transfer.

c) Optical fiber
Optical fiber is a kind of fiber made of glass or plastic, which can be used as a
light conduction tool. The transmission principle is "total reflection of light".

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

Figure 4(optical fiber.2019)


There are many types of fiber optics, and the required functionality and
performance vary depending on the use. According to fiber optic materials, the types
of optical fibers can be divided into quartz fiber and all-plastic fiber. According to the
difference of refractive index distribution of optical fiber contour, the types of optical
fiber are divided into step fiber and gradient fiber. According to the number of modes
of optical fiber transmission, the types of optical fibers can be divided into multimode
fiber and single-mode fiber. For optical fibers to have uniform international standards,
the International Telecommunication Union has developed a unified fibred-optic
standard (G standard). Fiber optics are now heavily used. It has many advantages.
Fiber optic band width, light weight, strong anti-jamming ability, high fidelity,
reliable performance, low cost. Therefore, it is easy to be accepted by the public.

From the above analysis you can know: The twisted-pair wire is in the
transmission distance, Channel width and data transmission speed and other aspects
are subject to certain restrictions; The large size of coaxial cable, Unable to withstand
entanglement, pressure and severe bending, and the cost is high. The advantages of
optical fibers are what they don't have. We give priority to fiber optics when choosing.

3. Wireless transmission
Wireless transmission refers to a way of data transmission using wireless
technology. With the development of wireless technology, the application of wireless
transmission technology is more and more accepted by all walks of life. Wireless
transmission is divided into: analog microwave transmission and digital microwave
transmission. I'll introduce them below.
a) Analog Microwave Transmission
Wireless microwave transmission is like light linear transmission, which is a
kind of relay transmission in the range of over-the-horizon. Analog microwave
transmission is the direct modulation of video signal on the microwave channel

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

through the antenna emission, monitoring center through the antenna to receive
microwave signal, and then through the microwave receiver to solve the original
video signal. Advantages: This way the image is very clear, no delay, no compression
loss, cheap cost, construction installation and commissioning are simple.
Disadvantages: Poor anti-jamming ability, easy to be affected by the weather and
surrounding environment, transmission distance is limited.

b) Digital Microwave Transmission


Digital microwave transmission is the first video encoding compression, and
then through the digital microwave channel modulation, and then through the antenna
emission, the antenna received the signal, the video decompression, and finally restore
the analog video signal. Advantages: Centralized transmission, multi-point
monitoring, strong anti-jamming ability. Cons: High cost.
Analog microwave transmission and digital microwave transmission have
their own advantages, how to choose should be combined with the actual.

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

7.0 Reliability Issues

Reliability is the most important indicator of each project, it represents the time
when the project can work without problems. The higher the reliability of a project,
the longer it can run without problems. The fact that a product can work without
trouble for a long time is exactly what all consumers need. Every electronic product in
the mall will be marked: it can work for a long time, which shows that reliability is
now a standard for customers to judge whether a product is good or not. In particular,
the network we designed is for schools, because it takes a long time to work, so
reliability must be high.
We designed the network layout to work without trouble for a long time, but in
order to ensure the hardware life, we recommend regular maintenance, close some
network hardware at night, keep the database server. We will do a good job of backing
up the database. If the database is lost due to a failure, the previously backed up
database can be directly restored. The network layout we designed is also very
maintainable, with only one body component, and it is easy to find the root cause of
troubleshooting. If the network we design is easy to fail, we will choose to design a
more conservative network layout to ensure high reliability.

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

8.0 Security Issues

Network security refers to the network system hardware, software and its
system data are protected, not for accidental or malicious reasons to be damaged,
changed, leaked, the system is continuously reliable and normal operation, network
services are not interrupted. The influencing factors of network security include:
natural disasters, accidents, ComputerCrime, Human behavior, such as improper use,
poor safety awareness, etc. Therefore, ensuring network security is critical.

1) First, the physical security of the network is the premise of the security of
the whole network system. Because the network system belongs to the weak power
project, the pressure resistance value is very low. Therefore, in the design of network
engineering, it is necessary to give priority to protecting protected persons and
network equipment from electricity, fire and lightning strikes. At the same time,
consider the distance between the wiring system and the lighting wires, power wires,
communication lines, heating pipes and hot and cold air pipes to ensure that they do
not affect each other. In addition, lightning protection systems must be built, and
lightning protection systems should consider the lightning protection of computers
and other weak and pressure-resistant equipment. You can also do some protection on
your computer's hardware, etc., to back up your data. In general, physical security is
mainly natural disasters and some accidents. You can also use more removable
devices, which can also reduce losses. At the same time, we should try to avoid the
physical security risks of the network.

2)Second, computer crime is also another threat to network security. This is


mainly due to hackers and wrongdoers of the attack on the computer network. They
also use a wide variety of criminal methods. This includes Trojans, viruses, cyber
scams, and more. So, we’re going to find it, too. Ways to deal with it. We can use
mobile code, instruction protection, cryptography, and so on. Use a password to
encrypt your account. Install firewalls, antivirus software, and protect against viruses
from the network. Avoid letting outsiders know your password, which will keep your

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

information safe. Do not browse unsafe websites to ensure that your computer is not
threatened by Trojan viruses.
Encrypt your own information, accounts, change passwords frequently, and maintain
your computer. All these methods can help you keep your network safe.

3)Third, Human factors can also affect network security. If individuals do


not pay attention to network security or do some wrong operations will also have an
impact on security. The increase in users can also pose a threat to the security of the
network, as there may be commercial spies here. User error, resulting in the disclosure
of their personal information. Wrongdoers, they can use it to invade your system,
which can pose a huge threat to system security. In addition, users do not close the
computer in time after using it, which will also give some people the opportunity to
invade your system. Therefore, we must learn the skills to use the computer correctly.
When using a computer outdoors, shutting down the computer in a timely manner is
also a protection method. Users should also not be illegally connected, illegally
accessed, etc. Learn to use it correctly and reduce cyber threats.

With the continuous development of society and Science and technology,


more and more ways threaten our network security. But at the same time, the means
of network security protection is constantly updated. Therefore, we must learn to use
them correctly. The combination of technology and management, reasonable
prevention of network security threats.

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

9.0 Sustainability Issues

The core idea of sustainable development is to coordinate economic


development, protect resources and protect ecological environment. Therefore, our
development should be based on this as the criterion.
When we build a computer network, we use multiple devices. For example,
computers, hosts, routers, and so on. Most of the materials that make these devices
cannot degrade. If you give it up at will, it will have an impact on our environment.
Therefore, if electronic equipment, etc., cannot be used, it should be destroyed
uniformly in the corresponding place. For some accessories that can be used,
recycling can not only protect the environment, but also save resources. At the same
time, when purchasing equipment, priority can be given to green energy-saving
products. This is done for the sake of sustainable development.
In addition, reduce the time spent using electronic devices. When not using
them, try to cut off the power. The device can do the action, do not turn on other
devices. These are the things we can do. Today, the environment is destroyed, and
energy is wasted. Too many people have yet to realize the importance of it. If there is
more profligacy, the earth will be overwhelmed and will eventually only be destroyed.
Like the greenhouse effect, sea level rise, ozone hole and so on are the result of
environmental damage.
For us personally, we can use energy-efficient green devices. Recycle
available accessories and dispose of waste correctly. Try to change our environment.
For the national government, the relevant laws can be introduced to restrain some of
the people's behavior. At the same time set up recycling stations and treatment
stations to deal with waste products and so on. Sustainable development is not a one-
man thing, but a matter for all mankind.

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

10.0 Conclusion

As a result of the efforts of our group, we have put an end to this task. It may
not be the best, but we all try to do it well. In addition, we have learned more about
the network. The emergence of the network has promoted the exchange and
development of the world. But there's a good side to that and there's going to be a bad
side. Find the right positioning, rational use of network technology for the benefit of
mankind. Nowadays, the Internet has become an indispensable part of our life. How
to use it correctly is worthy of our consideration. At the same time, in the process we
also know that we still have a lot of shortcomings. We will also learn lessons and try
to make up for our shortcomings.

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

References
GeeksforGeeks (2018), Computer Network | Types of routing. [Online] Available

at: https://www.geeksforgeeks.org/computer-network-types-routing/

[Accessed at: 20 January 2019].

GeeksforGeeks (2018), Types of Transmission Media. [Online] Available at:

https://www.geeksforgeeks.org/types-transmission-media/ [Accessed at: 20

January 2019].

Wikipedia (2017), sustainable development . [Online] Available at:


https://en.wikipedia.org/wiki/Sustainable_development [Accessed at: 23

January 2019].

Cisco (2018), What Is Network Security [Online] Available at:


https://www.cisco.com/c/en/us/products/security/what-is-network-security.html

[Accessed at: 25 January 2019].

Bozicevic, V. (2018). Cloud Computing Benefits: 7 Key Advantages for Your Business -

GlobalDots Blog. [online] GlobalDots - CDN, Security and Performance Solutions. Available

at: https://www.globaldots.com/cloud-computing-benefits/ [Accessed 28 Jan. 2019].

Noble1, H. Smith2, J (2015), Issues of validity and reliability in qualitative research


[Online] Available at: https://ebn.bmj.com/content/18/2/34 [Accessed at: 27
January 2019].

Sharma, S. (2017). What is a software server and what are the main differences
between a software server and a hardware server?. [online] Quora. Available at:
https://www.quora.com/What-is-a-software-server-and-what-are-the-main-
differences-between-a-software-server-and-a-hardware-server [Accessed 27 Jan.
2019].
Shekhar, A. (2016). Different Networking Devices And Hardware Types — Hub,
Switch, Router, Modem, Bridge, Repeater. [online] Fossbytes. Available at:
https://fossbytes.com/networking-devices-and-hardware-types/ [Accessed 28 Jan.
2019].
Cope, S. (2019). Basic Home Network And Internet Components, Devices and

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

Services. [online] Stevessmarthomeguide.com. Available at:


https://stevessmarthomeguide.com/networking-components/ [Accessed 28 Jan. 2019].

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation


CT043-3-1 Introduction to Network

Work Breakdown Structure


Name: Chen Zhao Ye Zhang Xu
Structure: Introduction (Objective, Scope) Introduction (Assumptions)
Floor Plan (Block A, Block B Floor Plan (Block C)
Diagram), Justification IP Addressing (Justification
Subnetting Plan)
Network Diagram(Network Design,
Routing
Topology, Configuration)
Security Issues
Network Devices (Hardware)
Transmission Medium
Cloud Services
Sustainability Issues
Software/Servers Conclusion
Reliability Issues
Sign:

UC1F1805IS/SE Asia Pacific University of Information Technology and Innovation

You might also like