0% found this document useful (0 votes)
83 views

Computer Network Technologies Project

This document proposes a computer network design for universities in developing nations. The goal is to create an integrated network system with high security but low costs. Various networking equipment like routers, switches, backups, firewalls and servers will be used. Special attention will be paid to security measures like passwords, encryption, antivirus software and backups to protect the network despite a low budget. The design aims to allow universities in developing countries to benefit from computer networks and satisfy standards of universities in affluent nations.

Uploaded by

jawad mughal
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
83 views

Computer Network Technologies Project

This document proposes a computer network design for universities in developing nations. The goal is to create an integrated network system with high security but low costs. Various networking equipment like routers, switches, backups, firewalls and servers will be used. Special attention will be paid to security measures like passwords, encryption, antivirus software and backups to protect the network despite a low budget. The design aims to allow universities in developing countries to benefit from computer networks and satisfy standards of universities in affluent nations.

Uploaded by

jawad mughal
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Computer network technologies project

Computer network for universities


Abstract
Computer network has been integrated into every aspect of our daily work, and
the impact brought to the security work of universities should not be
underestimated. Computer network plays important role in university life for
everyone like students, professors and administration. The goal of this project is
to create a network system that is appropriate for universities in developing
nations. The goal was to create a network with minimal costs and high-quality
security so that network equipment at universities in developing nations would
satisfy the same standards as those at universities in affluent nations. This
initiative will improve education in underdeveloped nations.
The network was designed using a variety of tools, including routers, switches,
backups, firewalls, and servers. To create an integrated network system, all
devices were connected to one another, and this system was set by assigning IP
addresses to each device. Although the budget for this design network was low, it
needed to have a high level of security. Accordingly, it incorporated several
mechanisms including a firewall device that prevents any unfavorable data from
entering into the network. Additionally, all devices in the network were secured
by passwords, and these passwords were encrypted to be more secure.
Moreover, each computer in the network was secured by antivirus programs and
a backup system.
Table of content

Contents
1.Real life problem....................................................................................................5
2.Introduction............................................................................................................5
3.Objectives...........................................................................................................6
4.Problems/challenges..............................................................................................6
5.Equipment Design Selection...................................................................................7
5.1Topologies........................................................................................................7
5.2Equipment........................................................................................................7
5.3Devices used...................................................................................................10
6.Security.................................................................................................................11
7.Implementation....................................................................................................13
8.Conclusion............................................................................................................18

Table of figures
Figure 1 Different types of wireless used..................................................................8
Figure 2 integration network system........................................................................9
Figure 3 access point star topology.........................................................................10
Figure 4 IP addresses used in universities...............................................................11
Figure 5 Virtual switch.............................................................................................12
Figure 6 Back up server...........................................................................................12
Figure 7 Firewall device...........................................................................................13
Figure 8 switches in network...................................................................................14
Figure 9 Routers configuration................................................................................15
Figure 10 static route configuration........................................................................15
Figure 11 Access point connected with router.......................................................16
Figure 12 DNS configuration...................................................................................16
Figure 13 Packet tracer campus network architecture...........................................17
Figure 14 Campus network architecture.................................................................17
1.Real life problem
The term computer network comes to mind whenever various technological
devices are linked together for the purpose of processing and distribution of
views and opinions among the group of people with the network. Computer
network enables the people to access the rich knowledge and skills from different
angles for the betterment of the institution or organization.
In developing countries universities don’t have proper computer network which
effect the students and faculty badly, they face many problems and challenges in
 Sharing files
 Accessibility.
 Content Management
 Controlling the administration activities due to lack of network
 Can’t run universities portals because of poor network
To overcome these challenges, we will design computer network design for
universities through which they can overcome these challenges.

2.Introduction to solution
Technology has reached its highest peak of development, especially in making
life easier for people. Well implemented technology is faster than human in
processing calculation and is more accurate. Technology has become an
important concept in our life. It assists in connecting communities together.
Obviously, people have started to use technology in every field of life including
education, health, the military, etc. The computer network represents a
component, especially on how it enhances the functional performance in
different fields and organizations, such as companies and schools. A school’s
computer network performs so many functions, such as connecting students with
the university, faculty, and the library. Most universities today use the network to
provide online education by connecting widely dispersed students with their
professors directly. For this reason, computer networks play a vital role in the
education area by providing efficient communications for the university
environment. However, the design of computer networks differs from one
university to another.
This is as a result of many factors which determine the differences. Such factors
include; adaptability, integration, resilience, security, and cost. Installing networks
in a university relies on the university’s budget, which differs by institution and
from country to country. For instance, there are many countries whose
universities do not have the financial capability for designing the ‘perfect’ or ideal
network. Yet these universities from these third world countries still need to have
good quality and more secure network equipment with less cost. This is because
these schools aspire to deliver capability in line with the leading prestigious
universities despite low budgets. Therefore, this design will be focusing on factors
that will enhance computer network for universities in developing countries to be
able to compete favorably with another computer network in modern country
universities.
3.Objectives
This project's primary objective is to demonstrate a Local Area Network design
appropriate for universities in emerging nations. In order to integrate networks
that have security, backup, and other capabilities available in a university network
in a developed country, many institutions in developing countries are looking for
new ways to do so. Universities in poor nations encounter difficulties creating a
network that meets the same criteria as those utilized in affluent nations. The
biggest issue facing developing nations is a huge budget deficit. These studies will
assist these institutions in developing a network that uses inexpensive techniques
without unacceptably sacrificing quality or security.

4.Problems/challenges
The first difficulties this network design would encounter are financial and
budgetary ones. There is a cap on the cost of designing the network system that
cannot be surpassed. This network architecture will be the answer for emerging
countries' network design.
This is so that this design can be implemented as an integration network system
with high levels of security and affordable device quality.
To finish installing every component of the network, equipment must be
available. Developing nations lack the full set of hardware necessary for local area
networks, including servers, backup systems, and firewalls. Another issue to
consider while establishing a network in developing nations is the provision of
devices.

5.Equipment Design Selection


In this section we will discuss design of our network topologies and equipment
we are using.
5.1Topologies
 Network topology
 Point to point topology
 Bus topology
 Ring topology
 Mesh topology
5.2Equipment
Each network must have a media for transferring information from one node to
another, or from one device to other devices. These media play a significant role
in determining the transmission speed of the network, maximum distance,
shielding against interference, and the cost of the network. There are two options
for general use: One of them is a physical connection, and the other one is
wireless.

Wireless:
Wireless is used to depict media communications in which electromagnetic waves
transfer the sign over part or most of the transmission path, so there is less need
for cable. There are many advantages in wireless transmission when compared to
wire. This includes the easy network installation with less time because "Wireless
networks save money on cabling costs and are easier than wired networks to
install, operate, and maintain.
Figure 1 Different types of wireless used

Connection setup:
The obvious way, given the constraints, to connecting devices together, all
computers must be connected to switches then switches must be connected to
the routers. After that, all routers connect to the last switch in order to link with
edge switch, in which various servers such as DHCP server and DNS server are
connected. The last switch is also connected to a firewall device. The firewall
device links to the NAT router, and then to the external networks or internet. The
figure below shows the connection setup of all devices.
Figure 2 integration network system

Wi-Fi:
The Wi-Fi is one type of wireless communication device used for connecting to a
network. It is imperative for daily life’s communication. Wi-Fi signal must be made
available to connect inside all buildings at the University. This is because all
students and 22 faculties make good use of the Wi-Fi connection with their
tablets, phones, and laptops, etc. The wireless local area network (WLANs) that
will be used in this project network design is (802.11). The 802.11 is an advance
group of details for WLANs developed by a group, working in the Institute of
Electrical and Electronics Engineers (IEEE).
Figure 3 access point star topology

5.3Devices used
All intended hardware for this network, including routers, switches, servers, etc.
from the Cisco corporation will be picked for the design. This is due to Cisco's high
standards. gadgets outperform other devices by a wide margin. On the Cisco
website, it states: "With Cisco intelligent network services such quality of service
(QoS), network systems, and across the whole network, continually supporting
and maintaining encryption regardless of where the user is, the same secure,
high-quality service delivery is available. a local branch or at the corporate office.
5075 hosts will be deployed in total for the network and is dispersed throughout
several university departments.
Figure 4 IP addresses used in universities

6.Security
Due to the constant development of software programs which has led to the
increase in the theft and the number of cyber security attacks, security has
become important for all hosts on a network. Network security must protect all
information and users supplied by a network. Security involves a pro-active
prevention process to avert any danger or attack in a network. A computer
administrator must be present in order to enforce the security of data access in
the network. In terms of securing the network, there are three major aspects to
consider. These include Infrastructure, Individual Systems/Components, and
Individual Hosts.
Figure 5 Virtual switch

Figure 6 Back up server


Figure 7 Firewall device

7.Implementation
Implementation is the carrying out or completing of a network project. This paper
will design a project involving a computer network that will be implemented in a
developing country.
 Pc
 Switches
 Routers
 NAT system
 Server
 ISP
 Access switch
 Multilayer network
Switches:
Switches are devices used on the network to transmit and receive data from one
device to another or to many devices depending on the message intended. A
switch provides the full bandwidth of the network to each port, thereby reducing
collisions on the network. Switches also perform functions from the Data Link
Layer (Layer 2 on the 46 OSI [Open Systems Interconnection] Model). If the switch
also performs routing capabilities, then it is considered to be a Layer 3 switch. In
strict terms, however, switches are Layer 2 devices.

Figure 8 switches in network

Routers:
A router is a networking device that forwards data packets between computer
networks. The router chooses the best path to transfer data packets to their
destination in the most efficient manner. Think of a router as a traffic cop at a
busy intersection. This traffic cop makes determinations on which vehicles get
through, which vehicles are not permitted on the path and the destination that
the vehicles may take.
Figure 9 Routers configuration

Figure 10 static route configuration


Figure 11 Access point connected with router

Figure 12 DNS configuration


Packet tracer universities network architecture:

Figure 13 Packet tracer campus network architecture

Campus network architecture:

Figure 14 Campus network architecture


8.Conclusion
This project has proven that a standard network system can be designed with less
cost. Although we used the cheapest devices in designing the network, the
security of this network turned out to be very strong. This is because the firewall
and backup devices used in this network are of good quality. All networks need
many servers for doing their work. For this research, we did not use all servers
because of cost, but we used some important servers such as DNS and DHCP.
These servers help the network to perform their functions in a smooth way.

You might also like